Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.26.124.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.26.124.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 19:15:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
214.124.26.66.in-addr.arpa domain name pointer syn-066-026-124-214.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.124.26.66.in-addr.arpa	name = syn-066-026-124-214.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.132.13.131 attack
Aug  7 23:27:38 nextcloud sshd\[23564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.131  user=root
Aug  7 23:27:39 nextcloud sshd\[23564\]: Failed password for root from 120.132.13.131 port 52208 ssh2
Aug  7 23:31:54 nextcloud sshd\[27688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.13.131  user=root
2020-08-08 06:19:35
176.31.255.223 attack
Aug  7 18:31:13 firewall sshd[18561]: Failed password for root from 176.31.255.223 port 37958 ssh2
Aug  7 18:34:47 firewall sshd[18625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.255.223  user=root
Aug  7 18:34:49 firewall sshd[18625]: Failed password for root from 176.31.255.223 port 48476 ssh2
...
2020-08-08 05:59:59
186.147.160.189 attack
Aug  7 21:45:03 game-panel sshd[18124]: Failed password for root from 186.147.160.189 port 46614 ssh2
Aug  7 21:49:33 game-panel sshd[18326]: Failed password for root from 186.147.160.189 port 58416 ssh2
2020-08-08 06:14:20
209.182.232.154 attack
Attempt to login to WordPress via /wp-login.php
2020-08-08 06:03:39
193.112.126.198 attack
Aug  7 23:34:52 ip106 sshd[30289]: Failed password for root from 193.112.126.198 port 36752 ssh2
...
2020-08-08 06:04:40
45.62.123.254 attack
Lines containing failures of 45.62.123.254 (max 1000)
Aug  2 05:54:29 UTC__SANYALnet-Labs__cac12 sshd[3085]: Connection from 45.62.123.254 port 36094 on 64.137.176.104 port 22
Aug  2 05:54:46 UTC__SANYALnet-Labs__cac12 sshd[3085]: User r.r from 45.62.123.254.16clouds.com not allowed because not listed in AllowUsers
Aug  2 05:54:46 UTC__SANYALnet-Labs__cac12 sshd[3085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.62.123.254.16clouds.com  user=r.r
Aug  2 05:54:53 UTC__SANYALnet-Labs__cac12 sshd[3085]: Failed password for invalid user r.r from 45.62.123.254 port 36094 ssh2
Aug  2 05:54:53 UTC__SANYALnet-Labs__cac12 sshd[3085]: Received disconnect from 45.62.123.254 port 36094:11: Bye Bye [preauth]
Aug  2 05:54:53 UTC__SANYALnet-Labs__cac12 sshd[3085]: Disconnected from 45.62.123.254 port 36094 [preauth]
Aug  4 02:20:16 UTC__SANYALnet-Labs__cac12 sshd[500]: Connection from 45.62.123.254 port 43570 on 64.137.176.96 port 22
Aug  4........
------------------------------
2020-08-08 06:16:49
189.130.202.131 attack
1596832010 - 08/07/2020 22:26:50 Host: 189.130.202.131/189.130.202.131 Port: 445 TCP Blocked
2020-08-08 06:06:23
36.67.181.17 attack
W 31101,/var/log/nginx/access.log,-,-
2020-08-08 06:08:58
185.202.1.24 attackbotsspam
RDP Brute-Force (honeypot 1)
2020-08-08 05:49:27
132.232.8.23 attack
Aug  8 00:02:49 sticky sshd\[13678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.8.23  user=root
Aug  8 00:02:50 sticky sshd\[13678\]: Failed password for root from 132.232.8.23 port 53690 ssh2
Aug  8 00:05:11 sticky sshd\[13682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.8.23  user=root
Aug  8 00:05:14 sticky sshd\[13682\]: Failed password for root from 132.232.8.23 port 52842 ssh2
Aug  8 00:07:37 sticky sshd\[13684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.8.23  user=root
2020-08-08 06:16:30
212.70.149.67 attackspambots
Aug  8 00:03:06 alpha postfix/smtps/smtpd[12347]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 00:04:52 alpha postfix/smtps/smtpd[12347]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  8 00:06:45 alpha postfix/smtps/smtpd[12347]: warning: unknown[212.70.149.67]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-08-08 06:06:55
185.156.73.42 attackspambots
SmallBizIT.US 3 packets to tcp(52440,52441,52442)
2020-08-08 06:01:37
194.26.29.12 attack
Multiport scan : 96 ports scanned 10 20 21 23 30 40 50 70 80 81 123 200 303 400 404 443 444 555 600 700 808 1001 1111 1122 1234 2002 2020 2211 2222 3000 3322 3344 3381 3382 3383 3385 3386 3387 3388 3390 3393 3394 3397 3399 3400 3401 4004 4444 4455 5000 5005 5050 5544 5555 5566 6000 6006 6060 6666 6677 7007 7766 7788 8000 8008 8080 8877 8899 9000 9009 9090 9988 9999 10001 11000 11111 12000 12345 13000 13389 14000 15000 16000 17000 .....
2020-08-08 05:47:49
49.74.219.26 attack
Aug  7 22:09:56 ns382633 sshd\[17208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26  user=root
Aug  7 22:09:58 ns382633 sshd\[17208\]: Failed password for root from 49.74.219.26 port 57597 ssh2
Aug  7 22:23:06 ns382633 sshd\[19816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26  user=root
Aug  7 22:23:07 ns382633 sshd\[19816\]: Failed password for root from 49.74.219.26 port 30696 ssh2
Aug  7 22:27:02 ns382633 sshd\[20606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26  user=root
2020-08-08 05:54:50
164.132.41.67 attackspambots
prod8
...
2020-08-08 05:47:25

Recently Reported IPs

220.147.59.98 49.178.102.8 185.166.181.231 210.109.231.230
203.114.225.254 144.104.121.219 178.96.49.134 113.37.35.238
124.152.22.89 233.220.22.19 71.202.187.94 225.64.43.229
199.161.100.198 217.251.236.146 162.131.156.139 50.226.253.203
36.159.30.239 176.26.244.221 50.118.80.139 173.238.123.197