Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.125.149.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.125.149.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 07:33:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
81.149.125.66.in-addr.arpa domain name pointer adsl-66-125-149-81.idcc.cc.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.149.125.66.in-addr.arpa	name = adsl-66-125-149-81.idcc.cc.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.139.229.64 attackspambots
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-26 21:40:12]
2019-07-27 11:18:08
49.234.106.172 attackbotsspam
Jul 27 03:16:06 localhost sshd\[44362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.106.172  user=root
Jul 27 03:16:08 localhost sshd\[44362\]: Failed password for root from 49.234.106.172 port 41938 ssh2
Jul 27 03:20:40 localhost sshd\[44513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.106.172  user=root
Jul 27 03:20:42 localhost sshd\[44513\]: Failed password for root from 49.234.106.172 port 56932 ssh2
Jul 27 03:25:11 localhost sshd\[44644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.106.172  user=root
...
2019-07-27 11:34:30
80.83.26.23 attack
Automatic report - Port Scan Attack
2019-07-27 11:56:24
113.105.142.228 attackspambots
Jul 27 01:34:44 [munged] sshd[5197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.105.142.228  user=root
Jul 27 01:34:46 [munged] sshd[5197]: Failed password for root from 113.105.142.228 port 60544 ssh2
2019-07-27 11:23:38
186.56.184.26 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 17:17:41,801 INFO [shellcode_manager] (186.56.184.26) no match, writing hexdump (dfba0ae755194c4271b20fc194c2d5ab :2866226) - MS17010 (EternalBlue)
2019-07-27 11:19:14
145.236.38.128 attack
k+ssh-bruteforce
2019-07-27 11:55:54
49.88.112.72 attack
Jul 27 05:01:12 * sshd[26400]: Failed password for root from 49.88.112.72 port 49709 ssh2
2019-07-27 11:12:45
51.38.142.90 attack
Autoban   51.38.142.90 REJECT
2019-07-27 11:33:51
122.228.19.79 attackbots
firewall-block, port(s): 82/tcp, 2121/tcp, 3306/tcp, 4567/tcp, 44818/tcp
2019-07-27 11:09:26
51.68.190.223 attack
SSH/22 MH Probe, BF, Hack -
2019-07-27 11:51:34
90.189.164.195 attackbots
Attempts against Pop3/IMAP
2019-07-27 11:57:29
77.222.113.20 attack
Unauthorised access (Jul 26) SRC=77.222.113.20 LEN=52 TTL=117 ID=5666 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-27 11:30:04
36.153.108.102 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-27 11:40:12
185.176.27.118 attackspambots
firewall-block, port(s): 4211/tcp, 4445/tcp, 7004/tcp, 63391/tcp
2019-07-27 11:42:11
170.150.179.198 attack
firewall-block, port(s): 34567/tcp
2019-07-27 11:44:23

Recently Reported IPs

4.52.25.173 84.223.86.91 107.196.50.61 205.212.157.48
172.188.92.203 72.176.27.24 231.101.95.236 245.87.174.142
239.135.169.129 68.248.129.112 189.239.184.209 80.122.243.190
3.188.184.137 192.98.158.76 75.197.134.202 75.121.117.70
41.169.163.10 59.22.164.88 55.220.34.203 194.236.53.217