Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.141.93.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.141.93.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 03:00:41 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.93.141.66.in-addr.arpa domain name pointer 66-141-93-80.ded.swbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.93.141.66.in-addr.arpa	name = 66-141-93-80.ded.swbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.204.130.250 attackbotsspam
Automatic report - Port Scan Attack
2020-08-27 18:22:58
45.95.168.190 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-27 18:19:54
195.54.160.30 attackbots
Fail2Ban Ban Triggered
2020-08-27 19:00:32
186.215.195.249 attack
Dovecot Invalid User Login Attempt.
2020-08-27 18:46:12
51.105.120.80 attack
Automatic report - XMLRPC Attack
2020-08-27 18:53:18
13.58.36.143 attack
received email spams with domain pingidentity.com
2020-08-27 18:21:51
47.75.3.195 attackspam
Brute Force
2020-08-27 18:24:54
87.246.7.130 attackspambots
Attempted Brute Force (dovecot)
2020-08-27 18:39:27
74.82.47.15 attack
Honeypot hit.
2020-08-27 18:30:02
123.18.7.160 attackspam
1598499889 - 08/27/2020 05:44:49 Host: 123.18.7.160/123.18.7.160 Port: 445 TCP Blocked
...
2020-08-27 18:24:34
118.194.132.112 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-08-27 18:53:49
177.21.213.253 attackspambots
(smtpauth) Failed SMTP AUTH login from 177.21.213.253 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-27 08:14:24 plain authenticator failed for ([177.21.213.253]) [177.21.213.253]: 535 Incorrect authentication data (set_id=fd2302)
2020-08-27 18:33:57
222.212.171.203 attackbots
2020-08-27T06:43:16.254050ollin.zadara.org auth[793454]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=nologin rhost=222.212.171.203
2020-08-27T06:43:28.665979ollin.zadara.org auth[793453]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=postmaster@zadara.org rhost=222.212.171.203
...
2020-08-27 19:00:20
91.229.112.5 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 1994 proto: tcp cat: Misc Attackbytes: 60
2020-08-27 18:59:58
189.149.58.62 attackspam
Port Scan
...
2020-08-27 18:54:37

Recently Reported IPs

147.59.186.32 24.136.226.170 200.118.44.243 143.18.201.55
239.12.11.210 159.49.124.157 64.0.12.137 43.143.198.58
81.82.189.163 4.232.181.107 211.109.46.75 169.203.131.181
180.219.44.57 42.162.119.120 247.34.215.165 201.134.165.57
123.32.206.74 220.234.184.211 114.56.9.153 188.42.32.34