Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dolbeau-Mistassini

Region: Quebec

Country: Canada

Internet Service Provider: Videotron

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       66.130.0.0 - 66.131.255.255
CIDR:           66.130.0.0/15
NetName:        VL-9BL
NetHandle:      NET-66-130-0-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Videotron Ltee (VL-421)
RegDate:        2001-06-05
Updated:        2020-10-08
Ref:            https://rdap.arin.net/registry/ip/66.130.0.0



OrgName:        Videotron Ltee
OrgId:          VL-421
Address:        150 Beaubien West
City:           Montreal
StateProv:      QC
PostalCode:     H2V 1C4
Country:        CA
RegDate:        2020-05-15
Updated:        2023-10-25
Comment:        https://www.videotron.com
Ref:            https://rdap.arin.net/registry/entity/VL-421


OrgTechHandle: NOC1226-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-514-380-7100 
OrgTechEmail:  SRIP@videotron.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1226-ARIN

OrgAbuseHandle: ABUSE263-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-514-281-8498 
OrgAbuseEmail:  abuse@videotron.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE263-ARIN

# end


# start

NetRange:       66.131.120.0 - 66.131.120.255
CIDR:           66.131.120.0/24
NetName:        VL-DHCPVIDEOTRON-SF-42837800
NetHandle:      NET-66-131-120-0-1
Parent:         VL-9BL (NET-66-130-0-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Videotron Ltee (C01765482)
RegDate:        2007-10-29
Updated:        2020-12-02
Ref:            https://rdap.arin.net/registry/ip/66.131.120.0


CustName:       Videotron Ltee
Address:        150 rue Beaubien Ouest
City:           Montreal
StateProv:      QC
PostalCode:     H2V 1C4
Country:        CA
RegDate:        2007-10-29
Updated:        2011-12-20
Ref:            https://rdap.arin.net/registry/entity/C01765482

OrgTechHandle: NOC1226-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-514-380-7100 
OrgTechEmail:  SRIP@videotron.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC1226-ARIN

OrgAbuseHandle: ABUSE263-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-514-281-8498 
OrgAbuseEmail:  abuse@videotron.ca
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE263-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.131.120.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44389
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.131.120.255.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 20:42:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
255.120.131.66.in-addr.arpa domain name pointer modemcable255.120-131-66.mc.videotron.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
255.120.131.66.in-addr.arpa	name = modemcable255.120-131-66.mc.videotron.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
182.207.182.156 attack
20 attempts against mh-ssh on float
2020-08-07 14:07:19
139.198.191.217 attackspam
Aug  7 07:06:48 lukav-desktop sshd\[12881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217  user=root
Aug  7 07:06:50 lukav-desktop sshd\[12881\]: Failed password for root from 139.198.191.217 port 33046 ssh2
Aug  7 07:11:33 lukav-desktop sshd\[13501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217  user=root
Aug  7 07:11:36 lukav-desktop sshd\[13501\]: Failed password for root from 139.198.191.217 port 39364 ssh2
Aug  7 07:16:18 lukav-desktop sshd\[8532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.191.217  user=root
2020-08-07 13:23:08
45.142.166.61 attack
Fail2Ban Ban Triggered
2020-08-07 14:02:30
174.138.42.143 attack
Aug  7 06:52:27 ovpn sshd\[32736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
Aug  7 06:52:29 ovpn sshd\[32736\]: Failed password for root from 174.138.42.143 port 48568 ssh2
Aug  7 07:05:18 ovpn sshd\[5314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
Aug  7 07:05:20 ovpn sshd\[5314\]: Failed password for root from 174.138.42.143 port 34304 ssh2
Aug  7 07:07:23 ovpn sshd\[6145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.42.143  user=root
2020-08-07 13:17:39
106.75.141.160 attack
detected by Fail2Ban
2020-08-07 13:50:34
139.59.32.156 attackspam
k+ssh-bruteforce
2020-08-07 13:48:15
45.129.33.13 attackbots
Persistent port scanning [40 denied]
2020-08-07 14:09:11
78.128.112.30 attackspam
Aug705:56:49server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle]Aug705:56:54server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle.com]Aug705:56:57server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[admin@tonymotorcycle.com]Aug705:57:01server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle@tonymotorcycle.com]Aug705:57:07server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymoto]Aug705:57:11server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle]Aug705:57:15server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle.com]Aug705:57:20server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[admin@tonymotorcycle.com]Aug705:57:24server4pure-ftpd:\(\?@78.128.112.30\)[WARNING]Authenticationfailedforuser[tonymotorcycle@tonymotorcycle.com]Aug705:57:30server4pure-ftpd:\(\?@78.128.112.30\)[WARNI
2020-08-07 13:22:23
218.92.0.212 attackbots
$f2bV_matches
2020-08-07 13:24:42
45.129.33.24 attackbots
Persistent port scanning [37 denied]
2020-08-07 14:03:24
68.183.193.148 attackbots
Aug  7 06:10:43 vmd36147 sshd[8926]: Failed password for root from 68.183.193.148 port 60564 ssh2
Aug  7 06:14:23 vmd36147 sshd[17093]: Failed password for root from 68.183.193.148 port 40214 ssh2
...
2020-08-07 13:46:05
58.213.22.242 attackbots
Attempted to establish connection to non opened port 1433
2020-08-07 14:04:23
222.118.135.43 attackbots
20/8/6@23:57:18: FAIL: IoT-Telnet address from=222.118.135.43
...
2020-08-07 13:29:40
45.129.33.17 attackspam
Persistent port scanning [25 denied]
2020-08-07 14:06:13
180.149.125.153 attack
Unauthorized connection attempt detected from IP address 180.149.125.153 to port 80
2020-08-07 13:28:41

Recently Reported IPs

103.105.208.136 117.135.48.177 14.212.70.3 8.138.152.0
34.22.151.143 106.119.57.69 195.175.254.2 167.94.138.161
180.153.197.104 20.169.108.13 206.42.225.250 58.212.237.216
124.31.104.181 159.0.75.209 159.0.75.81 159.0.75.76
43.199.229.129 54.83.151.136 52.72.114.140 42.236.17.214