Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Diego

Region: California

Country: United States

Internet Service Provider: CARInet Inc.

Hostname: unknown

Organization: CariNet, Inc.

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
port
2020-10-08 03:15:47
attackspambots
[-]:443 66.240.219.146 - - [07/Oct/2020:12:35:13 +0200] "n" 400 3573 "-" "-"
[-]:443 66.240.219.146 - - [07/Oct/2020:12:35:14 +0200] "n" 400 3782 "-" "-"
2020-10-07 19:29:34
attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 57 - port: 1194 proto: udp cat: Misc Attackbytes: 60
2020-08-27 20:53:22
attackbots
SIP/5060 Probe, BF, Hack -
2020-08-25 01:10:42
attackspam
Automatic report - Banned IP Access
2020-08-18 12:22:28
attackbotsspam
Port scan: Attack repeated for 24 hours
2020-08-16 02:10:06
attackbotsspam
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 4730
2020-08-06 17:07:42
attackbotsspam
srv02 Mass scanning activity detected Target: 9443  ..
2020-08-03 08:16:09
attackbots
Message meets Alert condition
date=2020-07-13 time=15:20:44 devname= devid= logid="0101037131" type="event" subtype="vpn" level="error" vd="root" eventtime=1594671644089578465 tz="-0500" logdesc="IPsec ESP" msg="IPsec ESP" action="error" remip=66.240.219.146 locip= remport=4500 locport=500 outintf="wan1" cookies="N/A" user="N/A" group="N/A" xauthuser="N/A" xauthgroup="N/A" assignip=N/A vpntunnel="N/A" status="esp_error" error_num="Received ESP packet with unknown SPI." spi="30303030" seq="30303030"
2020-07-14 05:21:27
attack
07/05/2020-11:00:13.794153 66.240.219.146 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 68
2020-07-05 23:08:41
attackspambots
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 8649
2020-06-21 06:48:16
attackbotsspam
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 4000
2020-06-14 02:51:01
attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 65 - port: 123 proto: UDP cat: Misc Attack
2020-06-04 05:07:23
attack
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 81
2020-05-31 22:28:57
attackbotsspam
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 636
2020-05-21 22:32:38
attackspam
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 1830
2020-04-23 18:50:45
attackbotsspam
04/12/2020-16:52:31.496512 66.240.219.146 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 68
2020-04-13 06:14:03
attackbots
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 8050
2020-03-31 16:44:37
attackbots
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 4042
2020-03-26 17:52:35
attackspam
US_CariNet,_<177>1584747777 [1:2403406:56115] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 54 [Classification: Misc Attack] [Priority: 2]:  {TCP} 66.240.219.146:26200
2020-03-21 08:34:16
attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 3048 proto: TCP cat: Misc Attack
2020-03-19 04:52:07
attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 55 - port: 5280 proto: TCP cat: Misc Attack
2020-03-17 21:25:38
attackbots
Unauthorized connection attempt detected from IP address 66.240.219.146 to port 8222
2020-03-12 15:10:14
attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 57 - port: 491 proto: TCP cat: Misc Attack
2020-03-05 18:43:07
attack
unauthorized connection attempt
2020-02-27 17:20:36
attack
02/25/2020-03:22:56.545292 66.240.219.146 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 69
2020-02-25 11:01:06
attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-22 15:15:16
attackbots
Port 6009 scan denied
2020-02-21 01:03:31
attackbots
port scan
/.well-known/security.txt
2020-02-16 17:49:39
attackspam
Fail2Ban Ban Triggered
2020-02-16 02:36:34
Comments on same subnet:
IP Type Details Datetime
66.240.219.133 attack
Unauthorized connection attempt detected from IP address 66.240.219.133 to port 53
2020-07-22 16:50:05
66.240.219.133 attackspam
Unauthorized connection attempt detected from IP address 66.240.219.133 to port 8000
2020-07-15 04:29:39
66.240.219.133 attackbotsspam
Unauthorized connection attempt detected from IP address 66.240.219.133 to port 9002
2020-07-11 13:00:38
66.240.219.133 attackspam
firewall-block, port(s): 7657/tcp
2020-07-09 00:54:15
66.240.219.133 attack
Unauthorized connection attempt detected from IP address 66.240.219.133 to port 8545
2020-07-08 17:00:09
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.240.219.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37177
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.240.219.146.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019033001 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sun Mar 31 08:18:19 +08 2019
;; MSG SIZE  rcvd: 118

Host info
146.219.240.66.in-addr.arpa domain name pointer burger.census.shodan.io.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
146.219.240.66.in-addr.arpa	name = burger.census.shodan.io.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
85.143.216.214 attackbots
Apr  1 10:52:26 mockhub sshd[6242]: Failed password for root from 85.143.216.214 port 36664 ssh2
...
2020-04-02 01:56:39
128.199.52.45 attackbots
Invalid user brs from 128.199.52.45 port 34558
2020-04-02 01:32:46
54.38.242.206 attackspambots
Apr  1 16:35:06 localhost sshd\[5474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.206  user=root
Apr  1 16:35:08 localhost sshd\[5474\]: Failed password for root from 54.38.242.206 port 58596 ssh2
Apr  1 16:40:14 localhost sshd\[5548\]: Invalid user javier from 54.38.242.206 port 60664
...
2020-04-02 01:31:46
195.66.105.20 attackbotsspam
Unauthorized connection attempt from IP address 195.66.105.20 on Port 445(SMB)
2020-04-02 01:29:35
197.220.163.230 attackbots
Unauthorized connection attempt detected from IP address 197.220.163.230 to port 445
2020-04-02 01:48:45
139.199.13.142 attackbots
Apr  1 14:30:50 vmd48417 sshd[8440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.13.142
2020-04-02 01:57:31
141.98.80.27 attackspam
2020-04-01 dovecot_plain authenticator failed for \(\[141.98.80.27\]\) \[141.98.80.27\]: 535 Incorrect authentication data \(set_id=gisela.**REMOVED**@**REMOVED**.de\)
2020-04-01 dovecot_plain authenticator failed for \(\[141.98.80.27\]\) \[141.98.80.27\]: 535 Incorrect authentication data
2020-04-01 dovecot_plain authenticator failed for \(\[141.98.80.27\]\) \[141.98.80.27\]: 535 Incorrect authentication data
2020-04-02 02:11:59
62.234.139.150 attack
5x Failed Password
2020-04-02 02:13:04
51.38.188.63 attackspam
Apr  1 12:42:45 web8 sshd\[22065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63  user=root
Apr  1 12:42:47 web8 sshd\[22065\]: Failed password for root from 51.38.188.63 port 58438 ssh2
Apr  1 12:46:47 web8 sshd\[24231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63  user=root
Apr  1 12:46:48 web8 sshd\[24231\]: Failed password for root from 51.38.188.63 port 41670 ssh2
Apr  1 12:50:44 web8 sshd\[26232\]: Invalid user kz from 51.38.188.63
2020-04-02 02:02:49
217.19.154.218 attackspambots
2020-04-01 03:31:52 server sshd[43577]: Failed password for invalid user root from 217.19.154.218 port 38083 ssh2
2020-04-02 02:00:42
183.88.219.206 attack
CMS (WordPress or Joomla) login attempt.
2020-04-02 01:40:23
78.177.90.249 attackbotsspam
Unauthorized connection attempt from IP address 78.177.90.249 on Port 445(SMB)
2020-04-02 01:58:37
167.114.152.139 attackbots
Apr  1 19:44:38 mout sshd[13135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139  user=root
Apr  1 19:44:40 mout sshd[13135]: Failed password for root from 167.114.152.139 port 40950 ssh2
2020-04-02 01:49:16
113.161.49.100 attack
Unauthorized connection attempt from IP address 113.161.49.100 on Port 445(SMB)
2020-04-02 01:49:39
106.12.26.160 attack
Apr  1 12:14:45 ny01 sshd[29716]: Failed password for root from 106.12.26.160 port 45074 ssh2
Apr  1 12:17:21 ny01 sshd[29967]: Failed password for root from 106.12.26.160 port 48020 ssh2
2020-04-02 01:53:25

Recently Reported IPs

162.241.225.147 106.12.206.216 88.83.205.41 154.8.138.184
60.217.197.218 178.128.215.179 91.134.241.32 1.55.133.43
81.22.45.230 173.254.194.15 190.96.185.82 221.125.165.59
178.62.33.38 211.103.131.72 61.33.196.235 206.189.190.32
122.243.129.204 187.58.65.21 177.68.32.75 164.132.199.211