Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: CARInet Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-29 22:18:50
attackbotsspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-30 07:23:58
Comments on same subnet:
IP Type Details Datetime
66.240.192.138 spamattack
Botnet DB Scanner
2024-04-19 11:17:12
66.240.192.138 proxy
VPN
2022-12-20 13:52:27
66.240.192.138 attack
python-requests/2.23.0
2020-10-05 02:55:26
66.240.192.138 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 60 - port: 1723 proto: tcp cat: Misc Attackbytes: 60
2020-10-04 18:38:04
66.240.192.138 attackbots
port
2020-10-01 04:54:50
66.240.192.138 attack
Found on   Github Combined on 3 lists    / proto=17  .  srcport=24067  .  dstport=88  .     (834)
2020-09-30 21:10:08
66.240.192.138 attackbots
Tried our host z.
2020-09-30 13:39:14
66.240.192.138 attack
ET SCAN Suspicious inbound to Oracle SQL port 1521 - port: 1521 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-09-06 21:42:21
66.240.192.138 attack
 TCP (SYN) 66.240.192.138:17313 -> port 465, len 44
2020-09-06 13:16:29
66.240.192.138 attackbotsspam
Scan ports
2020-09-06 05:33:28
66.240.192.138 attack
[Wed Aug 19 18:17:00 2020] - DDoS Attack From IP: 66.240.192.138 Port: 28693
2020-08-27 09:46:13
66.240.192.138 attackspambots
 TCP (SYN) 66.240.192.138:17422 -> port 195, len 44
2020-08-16 04:32:50
66.240.192.138 attack
Unauthorized connection attempt detected from IP address 66.240.192.138 to port 8001
2020-08-01 15:09:30
66.240.192.138 attackbots
Unauthorized connection attempt detected from IP address 66.240.192.138 to port 3310
2020-07-22 21:36:17
66.240.192.138 attackspambots
Unauthorized connection attempt detected from IP address 66.240.192.138 to port 1935
2020-06-29 18:05:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.240.192.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17206
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.240.192.39.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062901 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 30 07:23:52 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 39.192.240.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 39.192.240.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.33.179.106 attack
Autoban   178.33.179.106 AUTH/CONNECT
2019-11-06 05:36:29
188.163.50.119 attack
Unauthorized connection attempt from IP address 188.163.50.119 on Port 445(SMB)
2019-11-06 06:11:41
112.197.35.234 attackbotsspam
Unauthorized connection attempt from IP address 112.197.35.234 on Port 445(SMB)
2019-11-06 05:57:59
109.234.112.72 attack
Unauthorized connection attempt from IP address 109.234.112.72 on Port 445(SMB)
2019-11-06 06:03:46
62.20.62.211 attackbotsspam
ssh brute force
2019-11-06 05:51:57
174.198.6.84 attackspambots
WEB_SERVER 403 Forbidden
2019-11-06 05:54:49
201.212.6.97 attackbotsspam
Unauthorized connection attempt from IP address 201.212.6.97 on Port 445(SMB)
2019-11-06 05:55:21
41.109.68.174 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/41.109.68.174/ 
 
 DZ - 1H : (7)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DZ 
 NAME ASN : ASN36947 
 
 IP : 41.109.68.174 
 
 CIDR : 41.109.64.0/19 
 
 PREFIX COUNT : 408 
 
 UNIQUE IP COUNT : 4353792 
 
 
 ATTACKS DETECTED ASN36947 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 3 
 24H - 7 
 
 DateTime : 2019-11-05 15:30:46 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-06 05:57:07
63.241.180.196 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-11-06 05:55:08
65.30.45.147 attack
WEB_SERVER 403 Forbidden
2019-11-06 06:03:06
176.40.232.181 attack
Unauthorised access (Nov  5) SRC=176.40.232.181 LEN=52 TTL=108 ID=12510 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-06 06:06:21
189.58.77.115 attackbotsspam
" "
2019-11-06 06:11:12
117.215.247.157 attack
Unauthorized connection attempt from IP address 117.215.247.157 on Port 445(SMB)
2019-11-06 05:40:35
180.169.136.138 attackbotsspam
Failed password for root from 180.169.136.138 port 4592 ssh2
2019-11-06 05:48:35
129.28.181.209 attackbotsspam
Nov  5 16:32:30 srv2 sshd\[6145\]: Invalid user f3nd3r from 129.28.181.209
Nov  5 16:32:30 srv2 sshd\[6145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.181.209
Nov  5 16:32:32 srv2 sshd\[6145\]: Failed password for invalid user f3nd3r from 129.28.181.209 port 49954 ssh2
...
2019-11-06 06:07:47

Recently Reported IPs

106.51.64.85 106.51.53.212 103.115.195.42 103.87.31.205
103.48.21.58 101.99.6.122 92.252.166.85 92.252.156.184
77.247.108.127 59.124.222.3 46.98.80.163 200.66.113.88
168.228.148.167 106.52.104.231 95.64.77.154 14.173.5.58
187.109.59.1 207.46.13.21 180.244.102.126 170.233.174.53