Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.120.106.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.120.106.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:40:54 CST 2025
;; MSG SIZE  rcvd: 107
Host info
149.106.120.66.in-addr.arpa domain name pointer adsl-66-120-106-149.dsl.sndg02.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.106.120.66.in-addr.arpa	name = adsl-66-120-106-149.dsl.sndg02.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.199.21.245 attack
Sep 29 19:03:51 eddieflores sshd\[24945\]: Invalid user uy from 139.199.21.245
Sep 29 19:03:51 eddieflores sshd\[24945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
Sep 29 19:03:53 eddieflores sshd\[24945\]: Failed password for invalid user uy from 139.199.21.245 port 58625 ssh2
Sep 29 19:09:32 eddieflores sshd\[25492\]: Invalid user sinusbot from 139.199.21.245
Sep 29 19:09:32 eddieflores sshd\[25492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
2019-09-30 13:11:37
185.173.35.53 attackspam
Honeypot attack, port: 139, PTR: 185.173.35.53.netsystemsresearch.com.
2019-09-30 13:26:34
62.210.129.177 attackbots
Sep 30 06:03:48 mail sshd\[26417\]: Failed password for invalid user sysadmin from 62.210.129.177 port 39392 ssh2
Sep 30 06:06:57 mail sshd\[26691\]: Invalid user aravind from 62.210.129.177 port 47860
Sep 30 06:06:57 mail sshd\[26691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.129.177
Sep 30 06:06:58 mail sshd\[26691\]: Failed password for invalid user aravind from 62.210.129.177 port 47860 ssh2
Sep 30 06:10:13 mail sshd\[27063\]: Invalid user ke from 62.210.129.177 port 56344
2019-09-30 14:00:39
125.164.185.14 attackspam
port scan and connect, tcp 23 (telnet)
2019-09-30 13:07:22
60.250.23.233 attack
Sep 30 08:35:30 server sshd\[31740\]: Invalid user user from 60.250.23.233 port 35455
Sep 30 08:35:30 server sshd\[31740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.233
Sep 30 08:35:32 server sshd\[31740\]: Failed password for invalid user user from 60.250.23.233 port 35455 ssh2
Sep 30 08:40:18 server sshd\[15652\]: Invalid user xue from 60.250.23.233 port 59838
Sep 30 08:40:18 server sshd\[15652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.23.233
2019-09-30 13:49:34
41.164.195.204 attackspam
Sep 30 07:44:04 mail sshd\[6446\]: Invalid user demo from 41.164.195.204 port 60804
Sep 30 07:44:04 mail sshd\[6446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
Sep 30 07:44:06 mail sshd\[6446\]: Failed password for invalid user demo from 41.164.195.204 port 60804 ssh2
Sep 30 07:48:57 mail sshd\[7106\]: Invalid user areknet from 41.164.195.204 port 44680
Sep 30 07:48:57 mail sshd\[7106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
2019-09-30 14:01:02
110.35.79.23 attackspam
Sep 30 06:57:33 www5 sshd\[58502\]: Invalid user user from 110.35.79.23
Sep 30 06:57:33 www5 sshd\[58502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
Sep 30 06:57:35 www5 sshd\[58502\]: Failed password for invalid user user from 110.35.79.23 port 47126 ssh2
...
2019-09-30 13:41:46
187.188.169.123 attackbotsspam
Sep 30 06:24:08 lnxded64 sshd[4196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.169.123
Sep 30 06:24:10 lnxded64 sshd[4196]: Failed password for invalid user support1 from 187.188.169.123 port 60614 ssh2
Sep 30 06:29:14 lnxded64 sshd[5610]: Failed password for root from 187.188.169.123 port 46744 ssh2
2019-09-30 13:10:10
187.216.127.147 attackspambots
Sep 29 19:43:46 hiderm sshd\[22152\]: Invalid user stupid from 187.216.127.147
Sep 29 19:43:46 hiderm sshd\[22152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.216.127.147
Sep 29 19:43:48 hiderm sshd\[22152\]: Failed password for invalid user stupid from 187.216.127.147 port 54512 ssh2
Sep 29 19:48:34 hiderm sshd\[22504\]: Invalid user mapruser from 187.216.127.147
Sep 29 19:48:34 hiderm sshd\[22504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.216.127.147
2019-09-30 14:02:36
195.154.169.244 attackspam
2019-09-30T00:51:14.2074521495-001 sshd\[14913\]: Failed password for invalid user temporal from 195.154.169.244 port 45432 ssh2
2019-09-30T01:04:07.6525861495-001 sshd\[15777\]: Invalid user allan from 195.154.169.244 port 53554
2019-09-30T01:04:07.6602291495-001 sshd\[15777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-169-244.rev.poneytelecom.eu
2019-09-30T01:04:10.0577311495-001 sshd\[15777\]: Failed password for invalid user allan from 195.154.169.244 port 53554 ssh2
2019-09-30T01:08:26.6322191495-001 sshd\[16046\]: Invalid user popa3d from 195.154.169.244 port 37450
2019-09-30T01:08:26.6415671495-001 sshd\[16046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-169-244.rev.poneytelecom.eu
...
2019-09-30 13:28:16
106.13.200.7 attackspam
Sep 29 17:54:35 tdfoods sshd\[29593\]: Invalid user gui123 from 106.13.200.7
Sep 29 17:54:35 tdfoods sshd\[29593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.200.7
Sep 29 17:54:37 tdfoods sshd\[29593\]: Failed password for invalid user gui123 from 106.13.200.7 port 58484 ssh2
Sep 29 17:57:24 tdfoods sshd\[29838\]: Invalid user iulian from 106.13.200.7
Sep 29 17:57:24 tdfoods sshd\[29838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.200.7
2019-09-30 13:51:40
120.236.169.135 attackspam
SSH invalid-user multiple login try
2019-09-30 13:43:03
159.65.157.194 attackspam
Sep 30 07:46:04 mail sshd\[6726\]: Invalid user super from 159.65.157.194 port 39026
Sep 30 07:46:04 mail sshd\[6726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194
Sep 30 07:46:06 mail sshd\[6726\]: Failed password for invalid user super from 159.65.157.194 port 39026 ssh2
Sep 30 07:50:45 mail sshd\[7347\]: Invalid user developer from 159.65.157.194 port 50306
Sep 30 07:50:45 mail sshd\[7347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.157.194
2019-09-30 13:59:07
198.199.84.154 attackbots
Sep 30 00:44:11 plusreed sshd[15924]: Invalid user ax400 from 198.199.84.154
...
2019-09-30 13:11:06
200.35.59.171 attack
Sep 30 04:39:12 localhost sshd\[130876\]: Invalid user 123456 from 200.35.59.171 port 22446
Sep 30 04:39:12 localhost sshd\[130876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.35.59.171
Sep 30 04:39:14 localhost sshd\[130876\]: Failed password for invalid user 123456 from 200.35.59.171 port 22446 ssh2
Sep 30 04:41:24 localhost sshd\[130974\]: Invalid user tor from 200.35.59.171 port 28660
Sep 30 04:41:24 localhost sshd\[130974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.35.59.171
...
2019-09-30 13:05:08

Recently Reported IPs

230.159.76.7 15.95.88.237 59.236.247.242 130.223.195.103
170.188.9.44 121.222.71.34 242.102.7.164 78.32.166.169
28.76.226.213 217.100.196.130 197.185.45.102 220.9.11.71
79.184.220.212 252.6.200.162 50.142.252.231 226.131.177.162
241.211.45.28 213.192.166.54 39.114.181.42 147.195.232.75