Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.120.146.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.120.146.196.			IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122800 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 29 04:06:45 CST 2019
;; MSG SIZE  rcvd: 118
Host info
196.146.120.66.in-addr.arpa domain name pointer adsl-66-120-146-196.dsl.lsan03.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.146.120.66.in-addr.arpa	name = adsl-66-120-146-196.dsl.lsan03.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.70.3.30 attackspam
SSH Brute Force, server-1 sshd[4684]: Failed password for root from 45.70.3.30 port 46542 ssh2
2019-07-27 11:48:07
77.222.113.20 attack
Unauthorised access (Jul 26) SRC=77.222.113.20 LEN=52 TTL=117 ID=5666 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-27 11:30:04
12.130.138.110 attackspambots
blacklist
2019-07-27 11:37:07
80.82.77.139 attackspambots
27.07.2019 03:08:25 Connection to port 5357 blocked by firewall
2019-07-27 11:55:02
185.234.219.57 attack
Jul 27 05:42:25 relay postfix/smtpd\[31727\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 27 05:44:15 relay postfix/smtpd\[14553\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 27 05:46:06 relay postfix/smtpd\[14553\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 27 05:46:23 relay postfix/smtpd\[31730\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 27 05:48:09 relay postfix/smtpd\[14553\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-27 11:59:35
129.204.52.150 attack
Jul 27 05:27:24 vps647732 sshd[16453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.52.150
Jul 27 05:27:26 vps647732 sshd[16453]: Failed password for invalid user add from 129.204.52.150 port 38542 ssh2
...
2019-07-27 11:39:09
17.58.97.104 attackspam
[Fri Jul 26 09:06:34 2019] [error] [client 17.58.97.104] File does not exist: /home/schoenbrun.com/public_html/mitch.htm
2019-07-27 12:32:26
50.28.66.234 attackspam
[Fri Jul 26 09:20:02 2019] [error] [client 50.28.66.234] File does not exist: /home/sfaa/public_html/2018
2019-07-27 12:20:43
122.5.18.194 attack
Invalid user usuario from 122.5.18.194 port 10584
2019-07-27 11:58:13
52.143.153.32 attack
Tried sshing with brute force.
2019-07-27 12:22:43
51.38.231.36 attackbotsspam
Invalid user root1 from 51.38.231.36 port 42792
2019-07-27 11:33:09
54.36.150.65 attack
Automatic report - Banned IP Access
2019-07-27 11:32:27
193.9.246.35 attackspam
[portscan] Port scan
2019-07-27 11:54:33
159.65.182.7 attackbots
27.07.2019 02:18:15 SSH access blocked by firewall
2019-07-27 12:18:45
88.123.13.140 attack
Automatic report - Port Scan Attack
2019-07-27 11:29:20

Recently Reported IPs

77.63.241.235 47.245.95.55 18.181.171.71 47.118.180.141
186.215.32.41 150.254.36.45 179.181.19.113 169.159.194.0
175.107.50.74 80.6.143.152 12.78.148.224 117.87.103.56
168.121.99.102 181.23.23.136 95.218.47.161 187.108.0.129
186.219.211.9 173.83.64.159 5.227.122.5 161.44.175.21