Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.225.235.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.225.235.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:57:19 CST 2025
;; MSG SIZE  rcvd: 107
Host info
148.235.225.66.in-addr.arpa domain name pointer unknown.iad.scnet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.235.225.66.in-addr.arpa	name = unknown.iad.scnet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
84.247.48.25 attack
Automatic report - XMLRPC Attack
2020-05-05 04:10:52
3.235.137.141 attackspambots
May  4 19:40:54 *** sshd[21669]: Invalid user look from 3.235.137.141
2020-05-05 03:53:35
190.37.212.204 attackspam
Icarus honeypot on github
2020-05-05 03:37:54
185.143.74.108 attackspambots
May  4 21:26:31 mail.srvfarm.net postfix/smtpd[3345970]: warning: unknown[185.143.74.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 21:27:42 mail.srvfarm.net postfix/smtpd[3360444]: warning: unknown[185.143.74.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 21:28:45 mail.srvfarm.net postfix/smtpd[3359716]: warning: unknown[185.143.74.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 21:29:50 mail.srvfarm.net postfix/smtpd[3359715]: warning: unknown[185.143.74.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  4 21:31:01 mail.srvfarm.net postfix/smtpd[3360444]: warning: unknown[185.143.74.108]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-05 03:58:18
14.248.129.221 attackspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-05 04:12:23
115.159.48.220 attack
$f2bV_matches
2020-05-05 03:41:02
180.166.114.14 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-05 04:11:13
41.90.65.213 attack
Automatic report - Port Scan Attack
2020-05-05 03:57:12
49.232.23.127 attackbots
20 attempts against mh-ssh on install-test
2020-05-05 03:59:23
194.61.26.34 attack
prod6
...
2020-05-05 03:48:00
99.17.246.167 attackspam
Found by fail2ban
2020-05-05 03:43:21
119.252.166.10 attackspambots
Honeypot attack, port: 445, PTR: 10.166.iconpln.net.id.
2020-05-05 03:53:04
61.177.172.158 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-05-04T19:44:04Z
2020-05-05 03:56:40
139.59.25.248 attack
Automatic report - XMLRPC Attack
2020-05-05 03:41:45
218.50.4.41 attackbotsspam
2020-05-04 21:11:34,138 fail2ban.actions: WARNING [ssh] Ban 218.50.4.41
2020-05-05 03:35:23

Recently Reported IPs

116.41.242.117 232.16.246.93 86.203.215.183 219.21.179.68
137.115.11.8 96.251.213.124 17.244.4.171 146.174.192.37
149.193.122.43 116.92.188.168 43.192.85.99 15.158.75.109
146.211.207.67 208.103.22.191 198.25.73.60 83.15.170.180
201.253.32.67 234.6.101.177 54.3.52.241 16.158.56.203