Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.234.20.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5742
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.234.20.158.			IN	A

;; AUTHORITY SECTION:
.			2471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090800 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 09 06:46:57 CST 2019
;; MSG SIZE  rcvd: 117
Host info
158.20.234.66.in-addr.arpa domain name pointer pppoe.66.234.20.158.dslqz.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
158.20.234.66.in-addr.arpa	name = pppoe.66.234.20.158.dslqz.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.180.192.152 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-10-08 02:18:57
78.17.124.28 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: sky-78-17-124-28.bas512.cwt.btireland.net.
2020-10-08 02:22:50
198.12.248.77 attack
xmlrpc attack
2020-10-08 02:34:55
45.144.177.104 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: 45-144-177-104.hostinghubonline.com.
2020-10-08 02:30:13
24.139.182.74 attackspam
Automatic report - Port Scan Attack
2020-10-08 02:06:21
165.231.148.223 attack
Brute force attempt
2020-10-08 02:24:43
185.232.30.11 attackbots
TCP Port Scanning
2020-10-08 02:15:56
193.203.60.61 attackbotsspam
Port scan denied
2020-10-08 02:35:41
187.12.167.85 attackbots
SSH brute-force attempt
2020-10-08 02:23:43
69.55.49.187 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-07T14:44:21Z and 2020-10-07T14:52:20Z
2020-10-08 02:39:48
103.145.13.41 attackspam
scans once in preceeding hours on the ports (in chronological order) 8443 resulting in total of 29 scans from 103.145.13.0/24 block.
2020-10-08 02:39:20
78.112.113.121 attackbots
Attacking our email server
2020-10-08 02:21:54
173.12.214.30 attackbotsspam
Multiport scan : 4 ports scanned 80(x8) 443(x6) 465(x6) 8080(x9)
2020-10-08 02:14:50
189.125.93.48 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-10-08 02:31:59
59.126.105.222 attackbots
 TCP (SYN) 59.126.105.222:15842 -> port 23, len 44
2020-10-08 02:25:38

Recently Reported IPs

194.8.147.22 206.189.56.234 41.239.149.151 45.156.158.147
14.247.178.89 186.208.122.46 70.215.11.70 152.199.204.225
149.206.140.251 159.203.199.101 79.60.107.11 118.97.97.162
89.151.178.9 36.233.180.90 116.109.70.96 113.140.68.148
45.115.4.170 46.29.166.225 204.63.127.220 196.188.241.91