Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.194.85.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63597
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.194.85.144.			IN	A

;; AUTHORITY SECTION:
.			561	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020012001 1800 900 604800 86400

;; Query time: 253 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 04:37:19 CST 2020
;; MSG SIZE  rcvd: 117
Host info
144.85.194.66.in-addr.arpa domain name pointer 66-194-85-144.static.ctl.one.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.85.194.66.in-addr.arpa	name = 66-194-85-144.static.ctl.one.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.89.225.82 attackspam
Invalid user benoit from 159.89.225.82 port 50030
2019-07-28 07:27:04
185.220.101.44 attack
Fail2Ban Ban Triggered
2019-07-28 07:22:11
183.146.209.68 attackspambots
Invalid user desktop from 183.146.209.68 port 41817
2019-07-28 07:43:55
51.68.230.54 attackspam
Jul 28 01:47:32 vpn01 sshd\[10623\]: Invalid user qhsupport from 51.68.230.54
Jul 28 01:47:32 vpn01 sshd\[10623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Jul 28 01:47:34 vpn01 sshd\[10623\]: Failed password for invalid user qhsupport from 51.68.230.54 port 35650 ssh2
2019-07-28 07:54:02
220.92.16.90 attackbots
Invalid user cron from 220.92.16.90 port 54024
2019-07-28 07:42:13
37.139.13.105 attackbots
Invalid user zimbra from 37.139.13.105 port 52718
2019-07-28 07:17:25
106.12.205.48 attackspambots
Invalid user ncs from 106.12.205.48 port 55792
2019-07-28 07:29:59
142.93.87.106 attackbots
Time:     Sat Jul 27 12:46:49 2019 -0300
IP:       142.93.87.106 (US/United States/-)
Failures: 50 (WordPressBruteForceGET)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-07-28 07:36:21
85.152.163.233 attackspam
Invalid user pi from 85.152.163.233 port 38118
2019-07-28 07:32:22
185.220.100.253 attack
Fail2Ban Ban Triggered
2019-07-28 07:22:28
209.97.168.98 attack
Invalid user csgoserver from 209.97.168.98 port 47555
2019-07-28 07:35:04
68.183.83.82 attackbots
Jul 28 01:41:56 hosting sshd[9780]: Invalid user fake from 68.183.83.82 port 37846
Jul 28 01:41:56 hosting sshd[9780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.82
Jul 28 01:41:56 hosting sshd[9780]: Invalid user fake from 68.183.83.82 port 37846
Jul 28 01:41:58 hosting sshd[9780]: Failed password for invalid user fake from 68.183.83.82 port 37846 ssh2
...
2019-07-28 07:13:15
3.1.60.162 attackspam
Invalid user arun from 3.1.60.162 port 57086
2019-07-28 07:18:02
106.39.44.11 attackspambots
Invalid user www from 106.39.44.11 port 63284
2019-07-28 07:48:34
113.161.8.44 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-27 20:03:26,958 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.161.8.44)
2019-07-28 07:29:05

Recently Reported IPs

209.180.191.212 193.29.35.43 164.0.98.98 90.152.57.156
62.150.126.58 123.115.68.185 121.175.43.93 12.220.46.22
208.194.59.16 181.142.47.59 116.24.64.217 5.80.209.149
185.156.177.47 24.181.16.167 103.108.157.174 170.176.250.34
84.58.176.129 188.44.104.255 71.43.41.237 63.41.48.91