Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Hampton Inn

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackbotsspam
81/tcp
[2020-03-05]1pkt
2020-03-06 01:30:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.189.122.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.189.122.244.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030500 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 06 01:30:35 CST 2020
;; MSG SIZE  rcvd: 118
Host info
244.122.189.66.in-addr.arpa domain name pointer 066-189-122-244.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.122.189.66.in-addr.arpa	name = 066-189-122-244.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.115.51.162 attackspambots
Jun  5 01:28:11 haigwepa sshd[1110]: Failed password for root from 27.115.51.162 port 17970 ssh2
...
2020-06-05 07:45:15
209.141.41.4 attackbots
Port scanning [2 denied]
2020-06-05 07:28:55
114.35.222.183 attackbots
firewall-block, port(s): 8080/tcp
2020-06-05 07:47:11
104.244.73.251 attackspambots
SASL PLAIN auth failed: ruser=...
2020-06-05 07:21:13
103.21.149.200 attackbots
103.21.149.200 - - [04/Jun/2020:23:12:31 +0000] "GET /wp-login.php HTTP/1.1" 403 154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-05 07:56:17
106.13.15.242 attack
20 attempts against mh-ssh on cloud
2020-06-05 07:54:57
194.61.27.246 attackbotsspam
3390/tcp 3389/tcp...
[2020-04-09/06-04]72pkt,2pt.(tcp)
2020-06-05 07:35:02
106.13.110.74 attackspambots
SSH Invalid Login
2020-06-05 07:30:28
110.138.150.227 attackspam
1591302043 - 06/04/2020 22:20:43 Host: 110.138.150.227/110.138.150.227 Port: 445 TCP Blocked
2020-06-05 07:20:28
85.239.35.161 attack
(sshd) Failed SSH login from 85.239.35.161 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  5 00:48:47 amsweb01 sshd[31520]: Did not receive identification string from 85.239.35.161 port 53942
Jun  5 00:48:47 amsweb01 sshd[31519]: Did not receive identification string from 85.239.35.161 port 34832
Jun  5 00:48:57 amsweb01 sshd[31527]: Invalid user user from 85.239.35.161 port 36194
Jun  5 00:48:58 amsweb01 sshd[31521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.161  user=admin
Jun  5 00:48:59 amsweb01 sshd[31522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.161  user=admin
2020-06-05 07:30:51
185.220.101.229 attackbotsspam
prod6
...
2020-06-05 07:58:38
122.117.97.217 attackspambots
firewall-block, port(s): 8000/tcp
2020-06-05 07:41:37
91.121.221.195 attackspam
$f2bV_matches
2020-06-05 07:28:35
80.82.65.90 attack
Port scanning [4 denied]
2020-06-05 07:24:15
45.14.224.214 attack
recursive DNS query (pizzaseo.com)
2020-06-05 07:55:16

Recently Reported IPs

177.125.165.75 167.71.120.15 93.123.98.120 91.148.188.219
121.182.7.236 117.85.5.164 165.22.49.27 156.214.64.57
92.206.139.90 165.22.101.76 31.181.233.175 165.169.254.37
121.27.157.205 171.255.212.173 228.62.25.139 149.133.1.190
200.233.235.116 164.68.109.182 78.186.165.98 2a03:2880:11ff:31::face:b00c