Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       66.132.172.0 - 66.132.172.255
CIDR:           66.132.172.0/24
NetName:        CENSY
NetHandle:      NET-66-132-172-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2024-05-14
Updated:        2024-05-14
Ref:            https://rdap.arin.net/registry/ip/66.132.172.0



OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.io
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.io
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.io
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.172.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.132.172.130.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 13:00:07 CST 2026
;; MSG SIZE  rcvd: 107
Host info
130.172.132.66.in-addr.arpa domain name pointer 130.172.132.66.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.172.132.66.in-addr.arpa	name = 130.172.132.66.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.61.19 attackspambots
 TCP (SYN) 222.186.61.19:44145 -> port 8088, len 44
2020-07-16 15:02:28
35.188.182.88 attackbotsspam
20 attempts against mh-ssh on echoip
2020-07-16 15:13:05
167.172.98.89 attackspambots
Jul 16 09:42:59 lukav-desktop sshd\[28715\]: Invalid user pbsdata from 167.172.98.89
Jul 16 09:42:59 lukav-desktop sshd\[28715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89
Jul 16 09:43:00 lukav-desktop sshd\[28715\]: Failed password for invalid user pbsdata from 167.172.98.89 port 48155 ssh2
Jul 16 09:48:59 lukav-desktop sshd\[28736\]: Invalid user jkkim from 167.172.98.89
Jul 16 09:48:59 lukav-desktop sshd\[28736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.98.89
2020-07-16 14:56:24
196.15.211.92 attackbotsspam
Automatic report BANNED IP
2020-07-16 14:58:27
3.226.116.202 attack
trying to access non-authorized port
2020-07-16 14:42:23
162.243.130.31 attack
" "
2020-07-16 14:37:28
5.202.41.254 attackspambots
[H1] Blocked by UFW
2020-07-16 15:05:41
218.92.0.148 attack
2020-07-16T06:44:22.260173abusebot-6.cloudsearch.cf sshd[25447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
2020-07-16T06:44:24.382150abusebot-6.cloudsearch.cf sshd[25447]: Failed password for root from 218.92.0.148 port 13784 ssh2
2020-07-16T06:44:26.700158abusebot-6.cloudsearch.cf sshd[25447]: Failed password for root from 218.92.0.148 port 13784 ssh2
2020-07-16T06:44:22.260173abusebot-6.cloudsearch.cf sshd[25447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
2020-07-16T06:44:24.382150abusebot-6.cloudsearch.cf sshd[25447]: Failed password for root from 218.92.0.148 port 13784 ssh2
2020-07-16T06:44:26.700158abusebot-6.cloudsearch.cf sshd[25447]: Failed password for root from 218.92.0.148 port 13784 ssh2
2020-07-16T06:44:22.260173abusebot-6.cloudsearch.cf sshd[25447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho
...
2020-07-16 14:47:33
49.234.27.90 attack
Jul 15 23:43:43 ny01 sshd[19251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.27.90
Jul 15 23:43:45 ny01 sshd[19251]: Failed password for invalid user cam from 49.234.27.90 port 48852 ssh2
Jul 15 23:53:08 ny01 sshd[20593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.27.90
2020-07-16 14:55:54
13.72.249.53 attackspambots
2020-07-15T11:55:18.734674vps773228.ovh.net sshd[21357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.249.53
2020-07-15T11:55:18.721200vps773228.ovh.net sshd[21357]: Invalid user admin from 13.72.249.53 port 62332
2020-07-15T11:55:20.349150vps773228.ovh.net sshd[21357]: Failed password for invalid user admin from 13.72.249.53 port 62332 ssh2
2020-07-16T09:10:48.747854vps773228.ovh.net sshd[4526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.72.249.53  user=root
2020-07-16T09:10:50.934891vps773228.ovh.net sshd[4526]: Failed password for root from 13.72.249.53 port 13445 ssh2
...
2020-07-16 15:13:29
115.159.91.202 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-16 15:11:57
165.227.182.136 attackspambots
$f2bV_matches
2020-07-16 15:08:51
129.28.185.31 attack
Jul 16 00:22:46 lanister sshd[17387]: Failed password for invalid user www from 129.28.185.31 port 59996 ssh2
Jul 16 00:22:45 lanister sshd[17387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.185.31
Jul 16 00:22:45 lanister sshd[17387]: Invalid user www from 129.28.185.31
Jul 16 00:22:46 lanister sshd[17387]: Failed password for invalid user www from 129.28.185.31 port 59996 ssh2
2020-07-16 14:39:49
203.172.76.4 attackbots
Invalid user test from 203.172.76.4 port 58972
2020-07-16 14:38:23
222.186.180.8 attackbotsspam
2020-07-16T09:08:10+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-16 15:13:46

Recently Reported IPs

190.145.123.18 2606:4700:10::6816:2296 2606:4700:10::6814:5751 2606:4700:10::6816:4646
2606:4700:10::6816:379d 2606:4700:10::6816:1907 2606:4700:10::6814:4596 2606:4700:10::6814:5417
2606:4700:10::6816:371 2606:4700:10::6814:8130 72.245.200.59 114.16.22.28
2606:4700:10::6816:4394 2606:4700:10::6814:5950 2606:4700:10::ac43:1128 110.78.158.233
2606:4700:10::6816:1323 181.215.204.133 18.97.19.165 198.144.106.133