Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       66.132.195.0 - 66.132.195.255
CIDR:           66.132.195.0/24
NetName:        CENSY
NetHandle:      NET-66-132-195-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2024-05-14
Updated:        2024-05-14
Ref:            https://rdap.arin.net/registry/ip/66.132.195.0


OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.io
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.io
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.io
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.195.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.132.195.113.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 10:00:09 CST 2026
;; MSG SIZE  rcvd: 107
Host info
113.195.132.66.in-addr.arpa domain name pointer 113.195.132.66.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.195.132.66.in-addr.arpa	name = 113.195.132.66.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.8 attack
Jan 26 08:03:27 ns3042688 sshd\[9238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Jan 26 08:03:30 ns3042688 sshd\[9238\]: Failed password for root from 222.186.180.8 port 13324 ssh2
Jan 26 08:03:35 ns3042688 sshd\[9238\]: Failed password for root from 222.186.180.8 port 13324 ssh2
Jan 26 08:03:38 ns3042688 sshd\[9238\]: Failed password for root from 222.186.180.8 port 13324 ssh2
Jan 26 08:03:49 ns3042688 sshd\[9252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
...
2020-01-26 15:06:33
51.254.59.115 attackspam
Unauthorized connection attempt detected from IP address 51.254.59.115 to port 21 [J]
2020-01-26 15:03:11
137.59.0.6 attackbotsspam
Jan 26 07:48:43 meumeu sshd[29842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.0.6 
Jan 26 07:48:46 meumeu sshd[29842]: Failed password for invalid user anto from 137.59.0.6 port 46475 ssh2
Jan 26 07:52:04 meumeu sshd[30425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.0.6 
...
2020-01-26 15:07:20
91.212.150.145 attackbots
Jan 26 05:50:32 dcd-gentoo sshd[26354]: Invalid user pi from 91.212.150.145 port 58770
Jan 26 05:50:35 dcd-gentoo sshd[26354]: error: PAM: Authentication failure for illegal user pi from 91.212.150.145
Jan 26 05:50:32 dcd-gentoo sshd[26354]: Invalid user pi from 91.212.150.145 port 58770
Jan 26 05:50:35 dcd-gentoo sshd[26354]: error: PAM: Authentication failure for illegal user pi from 91.212.150.145
Jan 26 05:50:32 dcd-gentoo sshd[26354]: Invalid user pi from 91.212.150.145 port 58770
Jan 26 05:50:35 dcd-gentoo sshd[26354]: error: PAM: Authentication failure for illegal user pi from 91.212.150.145
Jan 26 05:50:35 dcd-gentoo sshd[26354]: Failed keyboard-interactive/pam for invalid user pi from 91.212.150.145 port 58770 ssh2
...
2020-01-26 15:37:53
191.102.120.69 attackbots
1580014310 - 01/26/2020 05:51:50 Host: 191.102.120.69/191.102.120.69 Port: 445 TCP Blocked
2020-01-26 15:02:02
128.199.126.89 attackbotsspam
Jan 26 08:01:30 vps691689 sshd[29161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.126.89
Jan 26 08:01:31 vps691689 sshd[29161]: Failed password for invalid user xf from 128.199.126.89 port 59703 ssh2
...
2020-01-26 15:08:32
128.199.44.102 attackbots
SSH Login Bruteforce
2020-01-26 15:32:37
103.4.217.138 attackbots
Jan 25 23:40:45 onepro3 sshd[11430]: Failed password for invalid user hb from 103.4.217.138 port 36864 ssh2
Jan 25 23:47:21 onepro3 sshd[11538]: Failed password for invalid user sftp from 103.4.217.138 port 48995 ssh2
Jan 25 23:51:11 onepro3 sshd[11544]: Failed password for root from 103.4.217.138 port 44937 ssh2
2020-01-26 15:21:15
5.196.75.178 attack
SSH invalid-user multiple login attempts
2020-01-26 15:28:18
121.162.131.223 attackbotsspam
Jan 26 05:45:28 DAAP sshd[28051]: Invalid user notebook from 121.162.131.223 port 38827
Jan 26 05:45:28 DAAP sshd[28051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223
Jan 26 05:45:28 DAAP sshd[28051]: Invalid user notebook from 121.162.131.223 port 38827
Jan 26 05:45:30 DAAP sshd[28051]: Failed password for invalid user notebook from 121.162.131.223 port 38827 ssh2
Jan 26 05:51:47 DAAP sshd[28165]: Invalid user machine from 121.162.131.223 port 36520
...
2020-01-26 15:03:57
104.248.36.131 attackbots
Jan 26 08:21:43 debian-2gb-nbg1-2 kernel: \[2282575.923061\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.36.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=44680 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2020-01-26 15:22:28
171.35.167.186 attackbots
Email rejected due to spam filtering
2020-01-26 15:36:00
138.185.193.93 attackbots
Brute forcing email accounts
2020-01-26 15:32:05
178.33.231.105 attackbots
[2020-01-26 02:17:45] NOTICE[1148] chan_sip.c: Registration from '' failed for '178.33.231.105:50518' - Wrong password
[2020-01-26 02:17:45] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-26T02:17:45.105-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="443",SessionID="0x7fd82c3faf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/178.33.231.105/50518",Challenge="4cf8f608",ReceivedChallenge="4cf8f608",ReceivedHash="78b8e9ec79810b5523aa509f4894df00"
[2020-01-26 02:22:30] NOTICE[1148] chan_sip.c: Registration from '' failed for '178.33.231.105:62390' - Wrong password
[2020-01-26 02:22:30] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-26T02:22:30.589-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="556",SessionID="0x7fd82c04c578",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/178.33.231.105
...
2020-01-26 15:26:57
182.61.188.132 attackbots
Unauthorized connection attempt detected from IP address 182.61.188.132 to port 2220 [J]
2020-01-26 15:30:56

Recently Reported IPs

209.141.57.166 109.162.246.85 2606:4700:10::6814:7441 2606:4700:10::6816:89
110.77.226.185 2606:4700:10::ac43:1880 2606:4700:10::6814:6413 2606:4700:10::6816:4446
2606:4700:10::6814:9010 43.153.71.227 150.129.80.177 32.240.74.67
216.254.140.132 185.242.3.236 193.176.31.156 2606:4700:10::6814:8527
2606:4700:10::6814:4683 2606:4700:10::ac43:2352 122.192.203.61 2606:4700:10::6814:9990