Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.139.121.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.139.121.145.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022013001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 31 11:50:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 145.121.139.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.121.139.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.145.12.100 attackspambots
Automatic report - Banned IP Access
2020-05-16 12:10:52
184.22.83.136 attack
tried to hack email
2020-05-16 10:44:17
195.231.3.146 attackbots
May 16 03:28:18 mail.srvfarm.net postfix/smtpd[2325383]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 16 03:28:18 mail.srvfarm.net postfix/smtpd[2325383]: lost connection after AUTH from unknown[195.231.3.146]
May 16 03:30:38 mail.srvfarm.net postfix/smtpd[2325372]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 16 03:30:38 mail.srvfarm.net postfix/smtpd[2325372]: lost connection after AUTH from unknown[195.231.3.146]
May 16 03:34:40 mail.srvfarm.net postfix/smtpd[2325383]: warning: unknown[195.231.3.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-16 12:19:03
122.51.67.249 attack
SSH brute force
2020-05-16 08:59:41
206.189.124.251 attackbots
xmlrpc attack
2020-05-16 08:52:20
159.192.159.177 attack
tried to hack email
2020-05-16 10:41:20
95.216.9.152 attackbotsspam
[portscan] Port scan
2020-05-16 08:44:51
27.71.165.128 attackspam
Attempted connection to port 8000.
2020-05-16 08:57:02
46.151.210.60 attackspambots
May 15 20:28:11 ny01 sshd[10786]: Failed password for root from 46.151.210.60 port 57340 ssh2
May 15 20:31:30 ny01 sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.151.210.60
May 15 20:31:32 ny01 sshd[11265]: Failed password for invalid user test from 46.151.210.60 port 55284 ssh2
2020-05-16 08:41:03
45.86.67.66 attack
TCP port 8089: Scan and connection
2020-05-16 12:01:19
51.158.118.70 attack
Invalid user ebaserdb from 51.158.118.70 port 48362
2020-05-16 09:00:51
198.20.103.178 attackspam
scan r
2020-05-16 08:45:37
112.196.97.85 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-16 12:08:29
94.241.232.50 attack
Unauthorized connection attempt from IP address 94.241.232.50 on Port 445(SMB)
2020-05-16 09:00:27
41.232.88.4 attackbotsspam
SSH bruteforce
2020-05-16 08:56:34

Recently Reported IPs

171.30.94.28 168.79.157.211 75.118.183.178 93.133.35.122
108.97.73.220 235.214.217.22 19.198.74.169 105.212.154.219
85.41.108.124 107.192.139.218 48.64.150.1 85.84.88.25
117.197.54.191 92.227.30.102 93.238.45.223 117.149.20.206
142.109.70.197 207.116.77.229 128.106.185.220 107.175.59.240