City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 66.132.195.0 - 66.132.195.255
CIDR: 66.132.195.0/24
NetName: CENSY
NetHandle: NET-66-132-195-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Censys, Inc. (CENSY)
RegDate: 2024-05-14
Updated: 2024-05-14
Ref: https://rdap.arin.net/registry/ip/66.132.195.0
OrgName: Censys, Inc.
OrgId: CENSY
Address: 116 1/2 S Main Street
City: Ann Arbor
StateProv: MI
PostalCode: 48104
Country: US
RegDate: 2018-08-06
Updated: 2019-08-03
Comment: https://censys.io
Ref: https://rdap.arin.net/registry/entity/CENSY
OrgAbuseHandle: CAT20-ARIN
OrgAbuseName: Censys Abuse Team
OrgAbusePhone: +1-248-629-0125
OrgAbuseEmail: scan-abuse@censys.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/CAT20-ARIN
OrgTechHandle: COT12-ARIN
OrgTechName: Censys Operations Team
OrgTechPhone: +1-248-629-0125
OrgTechEmail: ops@censys.com
OrgTechRef: https://rdap.arin.net/registry/entity/COT12-ARIN
OrgNOCHandle: COT12-ARIN
OrgNOCName: Censys Operations Team
OrgNOCPhone: +1-248-629-0125
OrgNOCEmail: ops@censys.com
OrgNOCRef: https://rdap.arin.net/registry/entity/COT12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.132.195.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;66.132.195.123. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 16:00:12 CST 2026
;; MSG SIZE rcvd: 107
123.195.132.66.in-addr.arpa domain name pointer 123.195.132.66.censys-scanner.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
123.195.132.66.in-addr.arpa name = 123.195.132.66.censys-scanner.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 190.145.49.189 | attack | 19/8/5@09:53:59: FAIL: Alarm-Intrusion address from=190.145.49.189 ... |
2019-08-06 00:15:12 |
| 216.218.206.107 | attackbotsspam | [portscan] tcp/23 [TELNET] *(RWIN=65535)(08050931) |
2019-08-05 23:27:36 |
| 81.218.78.30 | attack | SMB Server BruteForce Attack |
2019-08-05 23:39:08 |
| 118.25.5.197 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-06 00:21:50 |
| 213.33.244.218 | attackspambots | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-06 00:08:21 |
| 42.116.43.200 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-05 23:26:21 |
| 192.227.144.218 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-06 00:14:17 |
| 195.74.39.5 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-06 00:36:25 |
| 188.0.191.81 | attackspambots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-06 00:17:17 |
| 115.186.139.143 | attackspambots | firewall-block, port(s): 445/tcp |
2019-08-06 00:22:28 |
| 193.106.28.250 | attackspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-06 00:13:45 |
| 194.58.71.207 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08050931) |
2019-08-05 23:53:48 |
| 78.249.113.67 | attack | Automatic report - Port Scan Attack |
2019-08-06 00:28:19 |
| 1.160.194.184 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08050931) |
2019-08-06 00:34:28 |
| 61.164.96.82 | attackspambots | Scanning random ports - tries to find possible vulnerable services |
2019-08-05 23:41:55 |