Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       66.132.172.0 - 66.132.172.255
CIDR:           66.132.172.0/24
NetName:        CENSY
NetHandle:      NET-66-132-172-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2024-05-14
Updated:        2024-05-14
Ref:            https://rdap.arin.net/registry/ip/66.132.172.0



OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.io
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.io
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.io
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.172.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.132.172.196.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 22:00:16 CST 2026
;; MSG SIZE  rcvd: 107
Host info
196.172.132.66.in-addr.arpa domain name pointer 196.172.132.66.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.172.132.66.in-addr.arpa	name = 196.172.132.66.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.162.75 attack
Dec  1 23:44:03 localhost sshd\[12489\]: Invalid user vcsa from 106.13.162.75
Dec  1 23:44:03 localhost sshd\[12489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.162.75
Dec  1 23:44:05 localhost sshd\[12489\]: Failed password for invalid user vcsa from 106.13.162.75 port 52282 ssh2
Dec  1 23:50:17 localhost sshd\[12952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.162.75  user=backup
Dec  1 23:50:19 localhost sshd\[12952\]: Failed password for backup from 106.13.162.75 port 60034 ssh2
...
2019-12-02 07:18:49
206.189.73.71 attack
Dec  2 00:19:47 vps691689 sshd[22917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.73.71
Dec  2 00:19:49 vps691689 sshd[22917]: Failed password for invalid user 123 from 206.189.73.71 port 54002 ssh2
...
2019-12-02 07:32:41
178.150.141.93 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-12-02 07:17:31
159.65.151.216 attackspam
2019-12-01T23:02:41.061400shield sshd\[1190\]: Invalid user admin from 159.65.151.216 port 36442
2019-12-01T23:02:41.066276shield sshd\[1190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.151.216
2019-12-01T23:02:43.136850shield sshd\[1190\]: Failed password for invalid user admin from 159.65.151.216 port 36442 ssh2
2019-12-01T23:08:52.770067shield sshd\[2016\]: Invalid user firefart from 159.65.151.216 port 48302
2019-12-01T23:08:52.774406shield sshd\[2016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.151.216
2019-12-02 07:15:47
151.80.42.234 attack
Dec  1 13:01:58 auw2 sshd\[7024\]: Invalid user sin from 151.80.42.234
Dec  1 13:01:58 auw2 sshd\[7024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3006743.ip-151-80-42.eu
Dec  1 13:02:00 auw2 sshd\[7024\]: Failed password for invalid user sin from 151.80.42.234 port 57074 ssh2
Dec  1 13:07:47 auw2 sshd\[7560\]: Invalid user amadeu from 151.80.42.234
Dec  1 13:07:47 auw2 sshd\[7560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3006743.ip-151-80-42.eu
2019-12-02 07:11:10
113.2.232.9 attack
firewall-block, port(s): 23/tcp
2019-12-02 07:28:09
202.164.48.202 attackbots
2019-12-01T23:22:09.994154abusebot-4.cloudsearch.cf sshd\[9410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.164.48.202  user=nobody
2019-12-02 07:29:36
117.35.118.42 attackbots
Dec  1 23:44:45 [host] sshd[10531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.35.118.42  user=root
Dec  1 23:44:47 [host] sshd[10531]: Failed password for root from 117.35.118.42 port 41380 ssh2
Dec  1 23:50:40 [host] sshd[10773]: Invalid user truhe from 117.35.118.42
2019-12-02 06:55:56
218.92.0.180 attackbots
2019-12-01T23:00:16.892399abusebot-7.cloudsearch.cf sshd\[18697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.180  user=root
2019-12-02 07:13:32
106.12.116.185 attack
Dec  2 00:02:38 eventyay sshd[12445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.116.185
Dec  2 00:02:40 eventyay sshd[12445]: Failed password for invalid user izerable from 106.12.116.185 port 33998 ssh2
Dec  2 00:08:50 eventyay sshd[12690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.116.185
...
2019-12-02 07:31:35
104.236.252.162 attack
Dec  1 23:45:08 OPSO sshd\[24894\]: Invalid user salvo from 104.236.252.162 port 58442
Dec  1 23:45:08 OPSO sshd\[24894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
Dec  1 23:45:11 OPSO sshd\[24894\]: Failed password for invalid user salvo from 104.236.252.162 port 58442 ssh2
Dec  1 23:50:34 OPSO sshd\[26990\]: Invalid user hung from 104.236.252.162 port 43186
Dec  1 23:50:34 OPSO sshd\[26990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
2019-12-02 07:05:27
132.232.79.135 attackspam
Dec  1 13:03:15 wbs sshd\[16663\]: Invalid user osneider from 132.232.79.135
Dec  1 13:03:15 wbs sshd\[16663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
Dec  1 13:03:16 wbs sshd\[16663\]: Failed password for invalid user osneider from 132.232.79.135 port 53678 ssh2
Dec  1 13:09:41 wbs sshd\[17388\]: Invalid user dan from 132.232.79.135
Dec  1 13:09:41 wbs sshd\[17388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.79.135
2019-12-02 07:11:34
1.173.242.48 attack
" "
2019-12-02 07:17:13
178.128.144.227 attackbots
Dec  2 00:06:02 vps666546 sshd\[13577\]: Invalid user villaris from 178.128.144.227 port 53122
Dec  2 00:06:02 vps666546 sshd\[13577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
Dec  2 00:06:04 vps666546 sshd\[13577\]: Failed password for invalid user villaris from 178.128.144.227 port 53122 ssh2
Dec  2 00:11:16 vps666546 sshd\[13813\]: Invalid user smebye from 178.128.144.227 port 37878
Dec  2 00:11:16 vps666546 sshd\[13813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
...
2019-12-02 07:25:18
122.51.83.37 attackbots
Dec  2 01:23:07 microserver sshd[40679]: Invalid user alasset from 122.51.83.37 port 59764
Dec  2 01:23:07 microserver sshd[40679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.37
Dec  2 01:23:09 microserver sshd[40679]: Failed password for invalid user alasset from 122.51.83.37 port 59764 ssh2
Dec  2 01:31:51 microserver sshd[42093]: Invalid user suhada from 122.51.83.37 port 60706
Dec  2 01:31:51 microserver sshd[42093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.37
Dec  2 01:45:03 microserver sshd[43964]: Invalid user test from 122.51.83.37 port 51696
Dec  2 01:45:03 microserver sshd[43964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.83.37
Dec  2 01:45:05 microserver sshd[43964]: Failed password for invalid user test from 122.51.83.37 port 51696 ssh2
Dec  2 01:53:34 microserver sshd[45406]: Invalid user pcap from 122.51.83.37 port 33294
Dec  2 01:53
2019-12-02 07:02:25

Recently Reported IPs

2606:4700:10::6816:3598 2606:4700:10::ac43:2569 58.3.179.185 43.162.109.249
211.101.237.75 211.101.237.73 121.230.89.142 110.78.153.81
23.225.255.103 2606:4700:10::6814:6076 164.155.74.108 192.168.4.119
2606:4700:10::ac43:1981 192.204.32.133 66.132.172.98 45.133.59.37
156.211.197.89 2606:4700:10::6816:1277 2606:4700:10::6814:4650 2606:4700:10::6814:7960