Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.134.69.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.134.69.148.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010801 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 09 08:40:54 CST 2023
;; MSG SIZE  rcvd: 106
Host info
148.69.134.66.in-addr.arpa domain name pointer h-66-134-69-148.snva.ca.globalcapacity.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.69.134.66.in-addr.arpa	name = h-66-134-69-148.snva.ca.globalcapacity.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.192.96.253 attackbots
$f2bV_matches_ltvn
2019-10-23 01:19:58
211.251.237.70 attack
Oct 22 18:44:56 MK-Soft-VM7 sshd[24983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.251.237.70 
Oct 22 18:44:58 MK-Soft-VM7 sshd[24983]: Failed password for invalid user jboss from 211.251.237.70 port 59432 ssh2
...
2019-10-23 01:37:03
103.205.68.2 attack
Oct 22 18:52:47 [host] sshd[20008]: Invalid user download from 103.205.68.2
Oct 22 18:52:47 [host] sshd[20008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.205.68.2
Oct 22 18:52:49 [host] sshd[20008]: Failed password for invalid user download from 103.205.68.2 port 60372 ssh2
2019-10-23 01:24:01
222.186.180.8 attackspambots
Oct 22 22:18:57 areeb-Workstation sshd[4354]: Failed password for root from 222.186.180.8 port 48046 ssh2
Oct 22 22:19:10 areeb-Workstation sshd[4354]: Failed password for root from 222.186.180.8 port 48046 ssh2
...
2019-10-23 00:56:57
185.42.181.218 attack
[portscan] Port scan
2019-10-23 01:00:05
37.114.143.123 attack
Oct 22 13:45:48 arianus sshd\[30985\]: Invalid user admin from 37.114.143.123 port 47911
...
2019-10-23 01:31:38
118.31.36.134 attackbotsspam
[portscan] Port scan
2019-10-23 00:53:48
195.3.147.47 attack
Oct 22 18:03:22 herz-der-gamer sshd[414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.147.47  user=root
Oct 22 18:03:23 herz-der-gamer sshd[414]: Failed password for root from 195.3.147.47 port 21577 ssh2
...
2019-10-23 01:01:44
14.232.3.174 attackbotsspam
scan r
2019-10-23 01:34:29
106.13.195.84 attackspam
Oct 22 18:22:08 SilenceServices sshd[17534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.195.84
Oct 22 18:22:10 SilenceServices sshd[17534]: Failed password for invalid user czj!@# from 106.13.195.84 port 60738 ssh2
Oct 22 18:28:04 SilenceServices sshd[19058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.195.84
2019-10-23 01:08:32
118.70.182.185 attackbots
Oct 22 15:25:27 SilenceServices sshd[1401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.182.185
Oct 22 15:25:29 SilenceServices sshd[1401]: Failed password for invalid user test from 118.70.182.185 port 38748 ssh2
Oct 22 15:30:25 SilenceServices sshd[2754]: Failed password for root from 118.70.182.185 port 50550 ssh2
2019-10-23 00:53:15
145.239.83.89 attack
Oct 22 16:22:22 work-partkepr sshd\[29552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.83.89  user=root
Oct 22 16:22:24 work-partkepr sshd\[29552\]: Failed password for root from 145.239.83.89 port 55092 ssh2
...
2019-10-23 01:11:59
49.84.54.161 attackspam
/download/file.php?id=149&sid=ccfef4cb5be533607314935763d64b14
2019-10-23 00:56:15
128.199.133.201 attack
Oct 22 19:03:56 hosting sshd[25633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.201  user=root
Oct 22 19:03:58 hosting sshd[25633]: Failed password for root from 128.199.133.201 port 40395 ssh2
...
2019-10-23 00:53:01
185.206.225.180 attack
WEB SPAM: How to invest in Cryptocurrency and receive from $ 5896 per day: https://v.ht/l8ysE?&bwrzf=XCchUtZtNKE
2019-10-23 01:00:54

Recently Reported IPs

71.201.15.216 4.2.59.157 43.190.174.70 26.79.38.250
171.201.78.93 97.207.180.195 193.20.211.129 180.124.227.150
106.161.185.134 105.51.82.166 105.5.246.90 66.253.190.159
49.59.85.55 252.19.91.255 108.117.162.254 93.119.222.64
101.0.72.50 47.232.199.83 0.47.154.30 97.181.47.173