Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       66.132.195.0 - 66.132.195.255
CIDR:           66.132.195.0/24
NetName:        CENSY
NetHandle:      NET-66-132-195-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Censys, Inc. (CENSY)
RegDate:        2024-05-14
Updated:        2024-05-14
Ref:            https://rdap.arin.net/registry/ip/66.132.195.0



OrgName:        Censys, Inc.
OrgId:          CENSY
Address:        116 1/2 S Main Street
City:           Ann Arbor
StateProv:      MI
PostalCode:     48104
Country:        US
RegDate:        2018-08-06
Updated:        2019-08-03
Comment:        https://censys.io
Ref:            https://rdap.arin.net/registry/entity/CENSY


OrgAbuseHandle: CAT20-ARIN
OrgAbuseName:   Censys Abuse Team
OrgAbusePhone:  +1-248-629-0125 
OrgAbuseEmail:  scan-abuse@censys.io
OrgAbuseRef:    https://rdap.arin.net/registry/entity/CAT20-ARIN

OrgTechHandle: COT12-ARIN
OrgTechName:   Censys Operations Team
OrgTechPhone:  +1-248-629-0125 
OrgTechEmail:  ops@censys.io
OrgTechRef:    https://rdap.arin.net/registry/entity/COT12-ARIN

OrgNOCHandle: COT12-ARIN
OrgNOCName:   Censys Operations Team
OrgNOCPhone:  +1-248-629-0125 
OrgNOCEmail:  ops@censys.io
OrgNOCRef:    https://rdap.arin.net/registry/entity/COT12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.195.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.132.195.114.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 08:30:15 CST 2026
;; MSG SIZE  rcvd: 107
Host info
114.195.132.66.in-addr.arpa domain name pointer 114.195.132.66.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.195.132.66.in-addr.arpa	name = 114.195.132.66.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.176.112.45 attackspambots
Jul 13 21:01:51 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:221.176.112.45\]
...
2019-07-14 08:11:36
103.9.158.138 attackbots
firewall-block, port(s): 445/tcp
2019-07-14 07:50:57
177.128.213.38 attack
Automatic report - Port Scan Attack
2019-07-14 08:05:38
77.247.110.216 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-07-14 08:19:26
85.95.178.165 attackspam
Lines containing failures of 85.95.178.165
Jul 13 16:57:45 mellenthin postfix/smtpd[5627]: connect from 85-95-178-165.saransk.ru[85.95.178.165]
Jul x@x
Jul 13 16:57:46 mellenthin postfix/smtpd[5627]: lost connection after DATA from 85-95-178-165.saransk.ru[85.95.178.165]
Jul 13 16:57:46 mellenthin postfix/smtpd[5627]: disconnect from 85-95-178-165.saransk.ru[85.95.178.165] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=85.95.178.165
2019-07-14 07:57:26
180.179.227.201 attackbotsspam
Jul 13 21:59:06 vps691689 sshd[23725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.227.201
Jul 13 21:59:09 vps691689 sshd[23725]: Failed password for invalid user test from 180.179.227.201 port 34362 ssh2
Jul 13 22:04:55 vps691689 sshd[23928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.227.201
...
2019-07-14 08:17:00
1.173.79.35 attackspam
Unauthorized connection attempt from IP address 1.173.79.35 on Port 445(SMB)
2019-07-14 08:08:05
118.24.48.13 attack
Jul 13 14:22:50 vtv3 sshd\[7915\]: Invalid user uk from 118.24.48.13 port 46190
Jul 13 14:22:50 vtv3 sshd\[7915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.48.13
Jul 13 14:22:52 vtv3 sshd\[7915\]: Failed password for invalid user uk from 118.24.48.13 port 46190 ssh2
Jul 13 14:28:17 vtv3 sshd\[10716\]: Invalid user tommy from 118.24.48.13 port 40036
Jul 13 14:28:17 vtv3 sshd\[10716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.48.13
Jul 13 14:40:25 vtv3 sshd\[17542\]: Invalid user florin from 118.24.48.13 port 37970
Jul 13 14:40:25 vtv3 sshd\[17542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.48.13
Jul 13 14:40:28 vtv3 sshd\[17542\]: Failed password for invalid user florin from 118.24.48.13 port 37970 ssh2
Jul 13 14:43:30 vtv3 sshd\[18938\]: Invalid user postgres from 118.24.48.13 port 37450
Jul 13 14:43:30 vtv3 sshd\[18938\]: pam_unix\(sshd:aut
2019-07-14 08:18:38
40.121.95.87 attackbotsspam
Jul 13 20:54:22 marvibiene sshd[6069]: Invalid user alx from 40.121.95.87 port 60406
Jul 13 20:54:22 marvibiene sshd[6069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.95.87
Jul 13 20:54:22 marvibiene sshd[6069]: Invalid user alx from 40.121.95.87 port 60406
Jul 13 20:54:24 marvibiene sshd[6069]: Failed password for invalid user alx from 40.121.95.87 port 60406 ssh2
...
2019-07-14 08:18:13
118.25.99.101 attackbotsspam
Jul 13 17:04:41 srv206 sshd[12323]: Invalid user sym from 118.25.99.101
...
2019-07-14 08:08:52
175.123.6.232 attack
Automatic report - Port Scan Attack
2019-07-14 07:55:15
201.184.3.109 attack
Jul 13 18:04:49 srv-4 sshd\[13875\]: Invalid user admin from 201.184.3.109
Jul 13 18:04:49 srv-4 sshd\[13875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.3.109
Jul 13 18:04:51 srv-4 sshd\[13875\]: Failed password for invalid user admin from 201.184.3.109 port 44518 ssh2
...
2019-07-14 07:57:47
213.55.81.241 attackspambots
2019-07-13T23:40:51.745279abusebot-4.cloudsearch.cf sshd\[11923\]: Invalid user evelyn from 213.55.81.241 port 53892
2019-07-14 07:56:07
203.169.27.150 attackbots
Unauthorized connection attempt from IP address 203.169.27.150 on Port 445(SMB)
2019-07-14 07:50:36
118.107.233.29 attack
Jul 14 00:05:14 s64-1 sshd[4924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29
Jul 14 00:05:16 s64-1 sshd[4924]: Failed password for invalid user ts3 from 118.107.233.29 port 43341 ssh2
Jul 14 00:11:15 s64-1 sshd[4994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.107.233.29
...
2019-07-14 08:10:00

Recently Reported IPs

31.46.248.246 195.140.214.22 14.29.7.57 195.140.214.30
198.168.100.52 2606:4700:10::6814:4652 2606:4700:10::6814:6310 2606:4700:10::ac43:1948
2606:4700:10::6816:4346 2606:4700:10::6814:6085 14.207.194.186 2606:4700:10::6816:3592
2606:4700:10::ac43:2230 2606:4700:10::6814:8889 2606:4700:10::6814:5401 2606:4700:10::6814:5737
143.92.60.205 183.202.134.16 134.122.197.16 195.140.214.26