Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
66.130.63.48 attackbotsspam
"BROWSER-IE Microsoft Edge App-v vbs command attempt"
2020-07-08 09:18:46
66.130.63.10 attack
"BROWSER-IE Microsoft Edge App-v vbs command attempt"
2020-06-24 18:54:46
66.130.63.43 attackbotsspam
"BROWSER-IE Microsoft Edge App-v vbs command attempt"
2020-05-26 15:01:08
66.130.63.41 attackbotsspam
"BROWSER-IE Microsoft Edge App-v vbs command attempt"
2020-05-16 05:55:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.130.63.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22636
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.130.63.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:44:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
142.63.130.66.in-addr.arpa domain name pointer modemcable142.63-130-66.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.63.130.66.in-addr.arpa	name = modemcable142.63-130-66.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
181.48.225.126 attackspambots
DATE:2020-10-07 19:47:18, IP:181.48.225.126, PORT:ssh SSH brute force auth (docker-dc)
2020-10-08 03:40:12
192.35.168.233 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-08 03:32:14
192.35.168.232 attack
 TCP (SYN) 192.35.168.232:46662 -> port 9591, len 44
2020-10-08 03:33:15
115.56.197.167 attack
D-Link DAP-1860 Remote Command Injection Vulnerability, PTR: hn.kd.ny.adsl.
2020-10-08 03:43:15
178.128.187.109 attack
Oct  7 14:45:29 host sshd[15067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.187.109  user=root
Oct  7 14:45:31 host sshd[15067]: Failed password for root from 178.128.187.109 port 50758 ssh2
...
2020-10-08 03:26:06
192.35.168.231 attack
 TCP (SYN) 192.35.168.231:47005 -> port 9389, len 44
2020-10-08 03:42:50
218.92.0.223 attackspam
Oct  7 19:27:28 rush sshd[18575]: Failed password for root from 218.92.0.223 port 59064 ssh2
Oct  7 19:27:39 rush sshd[18575]: Failed password for root from 218.92.0.223 port 59064 ssh2
Oct  7 19:27:43 rush sshd[18575]: Failed password for root from 218.92.0.223 port 59064 ssh2
Oct  7 19:27:43 rush sshd[18575]: error: maximum authentication attempts exceeded for root from 218.92.0.223 port 59064 ssh2 [preauth]
...
2020-10-08 03:34:20
45.43.54.172 attackbots
SSH/22 MH Probe, BF, Hack -
2020-10-08 03:41:27
128.199.80.164 attackspam
Oct  7 12:31:06 [host] sshd[26589]: pam_unix(sshd:
Oct  7 12:31:07 [host] sshd[26589]: Failed passwor
Oct  7 12:33:23 [host] sshd[26621]: pam_unix(sshd:
2020-10-08 03:12:34
192.35.169.43 attackbots
" "
2020-10-08 03:31:59
192.35.169.45 attackbotsspam
Automatic report - Banned IP Access
2020-10-08 03:36:54
185.216.140.31 attackspam
Fail2Ban Ban Triggered
2020-10-08 03:24:15
43.245.222.163 attackbotsspam
Oct  7 11:14:44 propaganda sshd[65511]: Connection from 43.245.222.163 port 33482 on 10.0.0.161 port 22 rdomain ""
Oct  7 11:14:45 propaganda sshd[65511]: Connection closed by 43.245.222.163 port 33482 [preauth]
2020-10-08 03:11:05
45.129.33.4 attack
ET DROP Dshield Block Listed Source group 1 - port: 3391 proto: tcp cat: Misc Attackbytes: 60
2020-10-08 03:35:03
192.35.169.39 attackbots
 TCP (SYN) 192.35.169.39:21233 -> port 2058, len 44
2020-10-08 03:47:27

Recently Reported IPs

36.21.181.198 70.46.239.107 137.75.67.130 19.170.79.228
221.114.170.41 87.169.142.117 244.253.164.165 130.52.102.5
219.122.47.159 79.35.101.174 220.187.104.58 54.118.195.144
3.4.101.167 239.223.249.224 129.149.175.7 244.170.197.98
4.102.107.198 31.112.142.130 213.140.118.203 6.18.59.139