Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.20.145.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.20.145.213.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012600 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 26 18:18:12 CST 2022
;; MSG SIZE  rcvd: 106
Host info
213.145.20.66.in-addr.arpa domain name pointer adsl-66-20-145-213.aby.bellsouth.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.145.20.66.in-addr.arpa	name = adsl-66-20-145-213.aby.bellsouth.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.160.161.123 attackbots
1597895411 - 08/20/2020 05:50:11 Host: 113.160.161.123/113.160.161.123 Port: 445 TCP Blocked
2020-08-20 17:00:43
103.92.24.240 attack
Bruteforce detected by fail2ban
2020-08-20 16:53:43
58.57.100.34 attackspambots
firewall-block, port(s): 1433/tcp
2020-08-20 17:06:36
51.158.111.168 attack
Invalid user cacti from 51.158.111.168 port 50706
2020-08-20 17:12:51
106.75.66.108 attackbotsspam
Failed password for root from 106.75.66.108 port 45486 ssh2
2020-08-20 17:05:46
160.153.147.139 attackspambots
Automatic report - XMLRPC Attack
2020-08-20 17:31:30
106.12.6.55 attackbotsspam
Aug 20 02:58:11 firewall sshd[20233]: Invalid user ftpserver from 106.12.6.55
Aug 20 02:58:13 firewall sshd[20233]: Failed password for invalid user ftpserver from 106.12.6.55 port 35248 ssh2
Aug 20 03:02:45 firewall sshd[20341]: Invalid user pi from 106.12.6.55
...
2020-08-20 17:13:36
200.194.6.214 attackbots
Automatic report - Port Scan Attack
2020-08-20 17:21:54
180.97.182.226 attack
Aug 20 05:52:47 jumpserver sshd[225400]: Invalid user lost+found from 180.97.182.226 port 57812
Aug 20 05:52:49 jumpserver sshd[225400]: Failed password for invalid user lost+found from 180.97.182.226 port 57812 ssh2
Aug 20 05:54:43 jumpserver sshd[225424]: Invalid user eis from 180.97.182.226 port 52560
...
2020-08-20 17:29:46
118.69.77.64 attack
SMB Server BruteForce Attack
2020-08-20 17:26:44
176.57.69.143 attackbotsspam
 TCP (SYN) 176.57.69.143:59093 -> port 1080, len 52
2020-08-20 17:15:02
184.105.247.195 attackbotsspam
 TCP (SYN) 184.105.247.195:39817 -> port 80, len 44
2020-08-20 16:56:32
193.169.252.37 attack
C2,WP GET /wp-login.php
GET //wp-login.php
2020-08-20 17:16:30
51.210.181.54 attack
SSH auth scanning - multiple failed logins
2020-08-20 17:24:59
49.234.190.144 attackbotsspam
Aug 20 09:20:40 inter-technics sshd[6410]: Invalid user jh from 49.234.190.144 port 35548
Aug 20 09:20:40 inter-technics sshd[6410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.190.144
Aug 20 09:20:40 inter-technics sshd[6410]: Invalid user jh from 49.234.190.144 port 35548
Aug 20 09:20:42 inter-technics sshd[6410]: Failed password for invalid user jh from 49.234.190.144 port 35548 ssh2
Aug 20 09:23:48 inter-technics sshd[6590]: Invalid user admin from 49.234.190.144 port 40026
...
2020-08-20 17:13:07

Recently Reported IPs

131.185.227.234 216.133.19.51 121.45.32.189 45.95.94.141
45.128.158.236 127.6.10.11 53.191.142.240 140.83.35.41
106.51.119.155 115.231.116.96 79.79.101.188 177.178.216.249
66.197.36.246 13.59.180.120 58.65.221.7 119.26.255.23
108.220.10.233 246.79.231.195 164.41.240.173 58.65.221.95