Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.38.139.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.38.139.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010501 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 06:38:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
105.139.38.66.in-addr.arpa domain name pointer h66-38-139-105.gtconnect.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.139.38.66.in-addr.arpa	name = h66-38-139-105.gtconnect.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.199.164.240 attackspam
$f2bV_matches
2019-10-12 21:06:05
89.109.23.190 attack
" "
2019-10-12 20:59:34
152.44.100.32 attackbots
(From noreply@gplforest0968.live) Hello There,

Are you presently operating Wordpress/Woocommerce or perhaps might you intend to use it sooner or later ? We currently provide much more than 2500 premium plugins along with themes absolutely free to get : http://fburl.xyz/Uh6Nb

Thanks,

Lillie
2019-10-12 20:40:01
220.225.126.55 attack
Automatic report - Banned IP Access
2019-10-12 21:10:20
52.176.110.203 attackbotsspam
Oct 12 07:44:47 heissa sshd\[15862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203  user=root
Oct 12 07:44:49 heissa sshd\[15862\]: Failed password for root from 52.176.110.203 port 51455 ssh2
Oct 12 07:48:25 heissa sshd\[16368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203  user=root
Oct 12 07:48:28 heissa sshd\[16368\]: Failed password for root from 52.176.110.203 port 43593 ssh2
Oct 12 07:52:22 heissa sshd\[17010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203  user=root
2019-10-12 21:06:21
119.29.170.120 attackspambots
Oct 12 11:16:38 vps691689 sshd[7804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.170.120
Oct 12 11:16:41 vps691689 sshd[7804]: Failed password for invalid user 123Mexico from 119.29.170.120 port 33542 ssh2
...
2019-10-12 21:02:19
51.38.129.120 attack
Oct 12 14:47:37 MK-Soft-VM6 sshd[15025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120 
Oct 12 14:47:39 MK-Soft-VM6 sshd[15025]: Failed password for invalid user 12345%$#@! from 51.38.129.120 port 47130 ssh2
...
2019-10-12 20:57:36
159.203.141.208 attack
Oct 12 11:16:25 amit sshd\[24720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.141.208  user=root
Oct 12 11:16:27 amit sshd\[24720\]: Failed password for root from 159.203.141.208 port 39800 ssh2
Oct 12 11:21:00 amit sshd\[12048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.141.208  user=root
...
2019-10-12 20:45:21
138.197.166.110 attackspambots
2019-10-12T12:39:27.174335abusebot-5.cloudsearch.cf sshd\[23669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.110  user=root
2019-10-12 20:54:09
103.207.11.54 attack
[portscan] Port scan
2019-10-12 21:02:54
54.36.189.105 attack
Oct 12 02:50:39 web1 sshd\[18047\]: Invalid user abba from 54.36.189.105
Oct 12 02:50:39 web1 sshd\[18047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.189.105
Oct 12 02:50:41 web1 sshd\[18047\]: Failed password for invalid user abba from 54.36.189.105 port 53682 ssh2
Oct 12 02:50:45 web1 sshd\[18047\]: Failed password for invalid user abba from 54.36.189.105 port 53682 ssh2
Oct 12 02:50:47 web1 sshd\[18047\]: Failed password for invalid user abba from 54.36.189.105 port 53682 ssh2
2019-10-12 21:12:37
122.116.140.68 attackspam
Oct 12 07:49:08 vpn01 sshd[29786]: Failed password for root from 122.116.140.68 port 60916 ssh2
...
2019-10-12 20:32:10
200.195.188.2 attackspam
proto=tcp  .  spt=57010  .  dpt=25  .     (Listed on    truncate-gbudb also unsubscore and rbldns-ru)     (356)
2019-10-12 20:36:55
196.52.43.115 attack
Honeypot hit.
2019-10-12 20:30:35
217.146.204.33 attack
Automatic report - Port Scan Attack
2019-10-12 20:51:42

Recently Reported IPs

221.228.191.108 215.115.234.140 202.80.85.107 252.156.132.31
124.207.61.128 223.197.161.237 125.6.78.25 2a02:4540:e00d:9d1d:838:23ff:fe1f:7c02
2401:4900:8849:614c:ed1d:4541:992f:2f6d 148.135.188.71 198.192.106.91 22.105.41.163
224.33.255.154 127.126.151.101 26.206.152.249 12.173.110.227
21.253.166.33 40.166.60.170 137.62.167.17 88.227.36.48