Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.0.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.132.0.91.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 19:34:40 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 91.0.132.66.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 66.132.0.91.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.95.250.210 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-02-11 00:03:27
222.186.175.140 attack
Feb 10 16:20:03 prox sshd[23777]: Failed password for root from 222.186.175.140 port 17696 ssh2
Feb 10 16:20:06 prox sshd[23777]: Failed password for root from 222.186.175.140 port 17696 ssh2
2020-02-11 00:21:03
49.234.68.13 attackspam
$f2bV_matches
2020-02-11 00:22:55
46.242.66.70 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 00:48:31
217.216.132.152 attackbotsspam
Honeypot attack, port: 81, PTR: 217.216.132.152.dyn.user.ono.com.
2020-02-11 00:16:43
41.33.106.50 attackspam
Honeypot attack, port: 445, PTR: host-41.33.106.50.tedata.net.
2020-02-11 00:31:01
1.172.50.6 attack
Caught in portsentry honeypot
2020-02-11 00:02:12
121.182.166.81 attackbots
Feb 10 06:02:09 hpm sshd\[27375\]: Invalid user fkn from 121.182.166.81
Feb 10 06:02:09 hpm sshd\[27375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.81
Feb 10 06:02:11 hpm sshd\[27375\]: Failed password for invalid user fkn from 121.182.166.81 port 27585 ssh2
Feb 10 06:05:42 hpm sshd\[27673\]: Invalid user d from 121.182.166.81
Feb 10 06:05:42 hpm sshd\[27673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.166.81
2020-02-11 00:33:16
162.243.129.21 attackbotsspam
993/tcp 8888/tcp 5672/tcp...
[2020-02-02/10]4pkt,4pt.(tcp)
2020-02-11 00:42:51
129.82.138.44 attack
countinuos ping
2020-02-11 00:28:24
88.214.26.53 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-02-11 00:36:42
222.186.15.158 attackbotsspam
Feb 10 17:10:01 MK-Soft-VM6 sshd[3991]: Failed password for root from 222.186.15.158 port 26291 ssh2
Feb 10 17:10:04 MK-Soft-VM6 sshd[3991]: Failed password for root from 222.186.15.158 port 26291 ssh2
...
2020-02-11 00:14:40
179.117.162.102 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 00:21:27
122.51.86.120 attackbots
Brute force SMTP login attempted.
...
2020-02-11 00:19:08
113.161.227.36 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 10-02-2020 13:40:09.
2020-02-11 00:39:44

Recently Reported IPs

129.35.39.139 120.41.211.238 41.97.45.105 38.84.84.157
29.159.252.167 172.168.177.27 16.91.19.30 90.176.86.150
210.254.40.253 162.231.23.221 193.40.155.88 137.23.197.76
184.197.52.140 239.131.95.28 62.70.122.106 4.124.14.144
144.39.54.249 167.250.84.229 118.68.166.145 174.220.0.228