City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.132.172.0 - 66.132.172.255
CIDR: 66.132.172.0/24
NetName: CENSY
NetHandle: NET-66-132-172-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Censys, Inc. (CENSY)
RegDate: 2024-05-14
Updated: 2024-05-14
Ref: https://rdap.arin.net/registry/ip/66.132.172.0
OrgName: Censys, Inc.
OrgId: CENSY
Address: 116 1/2 S Main Street
City: Ann Arbor
StateProv: MI
PostalCode: 48104
Country: US
RegDate: 2018-08-06
Updated: 2019-08-03
Comment: https://censys.io
Ref: https://rdap.arin.net/registry/entity/CENSY
OrgAbuseHandle: CAT20-ARIN
OrgAbuseName: Censys Abuse Team
OrgAbusePhone: +1-248-629-0125
OrgAbuseEmail: scan-abuse@censys.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAT20-ARIN
OrgTechHandle: COT12-ARIN
OrgTechName: Censys Operations Team
OrgTechPhone: +1-248-629-0125
OrgTechEmail: ops@censys.com
OrgTechRef: https://rdap.arin.net/registry/entity/COT12-ARIN
OrgNOCHandle: COT12-ARIN
OrgNOCName: Censys Operations Team
OrgNOCPhone: +1-248-629-0125
OrgNOCEmail: ops@censys.com
OrgNOCRef: https://rdap.arin.net/registry/entity/COT12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.172.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.132.172.135. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026040301 1800 900 604800 86400
;; Query time: 328 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 02:00:07 CST 2026
;; MSG SIZE rcvd: 107
135.172.132.66.in-addr.arpa domain name pointer 135.172.132.66.censys-scanner.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
135.172.132.66.in-addr.arpa name = 135.172.132.66.censys-scanner.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 202.83.161.117 | attackspam | $f2bV_matches |
2020-10-07 21:03:03 |
| 203.148.87.154 | attackspambots | Lines containing failures of 203.148.87.154 Oct 6 22:28:39 shared05 sshd[1950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.87.154 user=r.r Oct 6 22:28:40 shared05 sshd[1950]: Failed password for r.r from 203.148.87.154 port 55816 ssh2 Oct 6 22:28:41 shared05 sshd[1950]: Received disconnect from 203.148.87.154 port 55816:11: Bye Bye [preauth] Oct 6 22:28:41 shared05 sshd[1950]: Disconnected from authenticating user r.r 203.148.87.154 port 55816 [preauth] Oct 6 22:35:31 shared05 sshd[5683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.148.87.154 user=r.r Oct 6 22:35:33 shared05 sshd[5683]: Failed password for r.r from 203.148.87.154 port 35263 ssh2 Oct 6 22:35:34 shared05 sshd[5683]: Received disconnect from 203.148.87.154 port 35263:11: Bye Bye [preauth] Oct 6 22:35:34 shared05 sshd[5683]: Disconnected from authenticating user r.r 203.148.87.154 port 35263 [preaut........ ------------------------------ |
2020-10-07 20:37:35 |
| 125.106.248.164 | attackbots | Connection to SSH Honeypot - Detected by HoneypotDB |
2020-10-07 21:12:17 |
| 47.30.178.158 | attackspam | 1602017105 - 10/06/2020 22:45:05 Host: 47.30.178.158/47.30.178.158 Port: 445 TCP Blocked |
2020-10-07 20:58:38 |
| 110.43.50.194 | attack | 2020-10-06T20:43:02.322073Z ef41ab5d1374 New connection: 110.43.50.194:45960 (172.17.0.5:2222) [session: ef41ab5d1374] 2020-10-06T20:45:03.886084Z edc80a906f89 New connection: 110.43.50.194:9848 (172.17.0.5:2222) [session: edc80a906f89] |
2020-10-07 21:06:25 |
| 185.176.27.42 | attackbotsspam | scans 15 times in preceeding hours on the ports (in chronological order) 6411 27036 6141 4488 51213 37954 4147 7000 6320 51447 9273 51371 9759 9878 6407 resulting in total of 59 scans from 185.176.27.0/24 block. |
2020-10-07 21:03:27 |
| 203.66.168.81 | attackbots | 203.66.168.81 (TW/Taiwan/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 7 06:06:48 server2 sshd[27697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.27.19.222 user=root Oct 7 06:06:50 server2 sshd[27697]: Failed password for root from 36.27.19.222 port 54913 ssh2 Oct 7 06:06:50 server2 sshd[27702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195 user=root Oct 7 06:06:52 server2 sshd[27702]: Failed password for root from 112.199.118.195 port 63131 ssh2 Oct 7 06:06:37 server2 sshd[27685]: Failed password for root from 51.77.230.49 port 58370 ssh2 Oct 7 06:07:25 server2 sshd[28064]: Failed password for root from 203.66.168.81 port 51330 ssh2 IP Addresses Blocked: 36.27.19.222 (CN/China/-) 112.199.118.195 (PH/Philippines/-) 51.77.230.49 (FR/France/-) |
2020-10-07 20:36:36 |
| 122.194.229.54 | attackbotsspam | Oct 7 15:01:32 vps647732 sshd[15226]: Failed password for root from 122.194.229.54 port 52916 ssh2 Oct 7 15:01:46 vps647732 sshd[15226]: error: maximum authentication attempts exceeded for root from 122.194.229.54 port 52916 ssh2 [preauth] ... |
2020-10-07 21:08:45 |
| 236.253.88.46 | attack | Hi |
2020-10-07 20:49:38 |
| 23.95.186.184 | attackspam | Lines containing failures of 23.95.186.184 Oct 5 08:24:17 siirappi sshd[27350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.186.184 user=r.r Oct 5 08:24:19 siirappi sshd[27350]: Failed password for r.r from 23.95.186.184 port 42796 ssh2 Oct 5 08:24:20 siirappi sshd[27350]: Received disconnect from 23.95.186.184 port 42796:11: Bye Bye [preauth] Oct 5 08:24:20 siirappi sshd[27350]: Disconnected from authenticating user r.r 23.95.186.184 port 42796 [preauth] Oct 5 08:37:22 siirappi sshd[27504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.95.186.184 user=r.r Oct 5 08:37:24 siirappi sshd[27504]: Failed password for r.r from 23.95.186.184 port 44624 ssh2 Oct 5 08:37:26 siirappi sshd[27504]: Received disconnect from 23.95.186.184 port 44624:11: Bye Bye [preauth] Oct 5 08:37:26 siirappi sshd[27504]: Disconnected from authenticating user r.r 23.95.186.184 port 44624 [preauth........ ------------------------------ |
2020-10-07 20:41:03 |
| 185.200.118.44 | attack | scans once in preceeding hours on the ports (in chronological order) 1723 resulting in total of 7 scans from 185.200.118.0/24 block. |
2020-10-07 20:47:21 |
| 122.60.56.76 | attackbots | Oct 7 14:18:40 fhem-rasp sshd[21941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.60.56.76 user=root Oct 7 14:18:42 fhem-rasp sshd[21941]: Failed password for root from 122.60.56.76 port 55632 ssh2 ... |
2020-10-07 20:49:10 |
| 121.69.89.78 | attackbots | Oct 7 14:28:10 OPSO sshd\[30558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78 user=root Oct 7 14:28:11 OPSO sshd\[30558\]: Failed password for root from 121.69.89.78 port 57104 ssh2 Oct 7 14:32:38 OPSO sshd\[31326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78 user=root Oct 7 14:32:40 OPSO sshd\[31326\]: Failed password for root from 121.69.89.78 port 59756 ssh2 Oct 7 14:36:51 OPSO sshd\[31967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78 user=root |
2020-10-07 20:52:45 |
| 96.241.84.252 | attackbotsspam | Unauthorised access (Oct 7) SRC=96.241.84.252 LEN=44 TOS=0x10 PREC=0x40 TTL=53 ID=55922 TCP DPT=8080 WINDOW=55987 SYN Unauthorised access (Oct 7) SRC=96.241.84.252 LEN=44 TOS=0x10 PREC=0x40 TTL=53 ID=27874 TCP DPT=8080 WINDOW=90 SYN Unauthorised access (Oct 6) SRC=96.241.84.252 LEN=44 TOS=0x10 PREC=0x40 TTL=53 ID=22455 TCP DPT=8080 WINDOW=55987 SYN Unauthorised access (Oct 5) SRC=96.241.84.252 LEN=44 TOS=0x10 PREC=0x40 TTL=53 ID=18733 TCP DPT=8080 WINDOW=55987 SYN |
2020-10-07 21:11:00 |
| 45.251.33.87 | attackspambots | Unauthorized connection attempt from IP address 45.251.33.87 on Port 445(SMB) |
2020-10-07 20:57:00 |