Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Telastic

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspambots
firewall-block, port(s): 81/tcp
2019-09-30 19:44:23
Comments on same subnet:
IP Type Details Datetime
66.42.127.226 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-10 21:35:50
66.42.127.226 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-10 13:19:35
66.42.127.226 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-10 04:03:36
66.42.116.151 attackbotsspam
06.09.2020 20:55:15 - Wordpress fail 
Detected by ELinOX-ALM
2020-09-07 07:58:46
66.42.117.60 attackbots
Invalid user ix from 66.42.117.60 port 35054
2020-06-18 14:33:27
66.42.117.60 attackspambots
Jun 17 21:13:47 mout sshd[29969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.42.117.60 
Jun 17 21:13:47 mout sshd[29969]: Invalid user patrick from 66.42.117.60 port 37370
Jun 17 21:13:50 mout sshd[29969]: Failed password for invalid user patrick from 66.42.117.60 port 37370 ssh2
2020-06-18 03:32:59
66.42.196.4 attackspam
Port Scan
2020-05-30 01:38:31
66.42.102.227 attack
xmlrpc attack
2020-05-24 00:31:13
66.42.105.203 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-04 03:28:20
66.42.114.72 attackspam
15-Apr-2020 06:43:36.381 client @0x7f649c1457e0 66.42.114.72#60348 (yahoo.qpon): view external: query (cache) 'yahoo.qpon/A/IN' denied
15-Apr-2020 06:43:36.381 client @0x7f64a40c72f0 66.42.114.72#23513 (yahoo.forex): view external: query (cache) 'yahoo.forex/A/IN' denied
15-Apr-2020 06:43:36.381 client @0x7f649c1219e0 66.42.114.72#58887 (yahoo.site): view external: query (cache) 'yahoo.site/A/IN' denied
2020-04-15 15:02:51
66.42.114.152 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/66.42.114.152/ 
 
 US - 1H : (16)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN20473 
 
 IP : 66.42.114.152 
 
 CIDR : 66.42.112.0/20 
 
 PREFIX COUNT : 584 
 
 UNIQUE IP COUNT : 939776 
 
 
 ATTACKS DETECTED ASN20473 :  
  1H - 3 
  3H - 5 
  6H - 5 
 12H - 5 
 24H - 5 
 
 DateTime : 2020-04-12 05:56:39 
 
 INFO : DNS DENIED Scan Detected and Blocked by ADMIN  - data recovery
2020-04-12 13:50:35
66.42.110.138 attack
(sshd) Failed SSH login from 66.42.110.138 (US/United States/66.42.110.138.vultr.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 23:27:35 ubnt-55d23 sshd[26465]: Invalid user postgres from 66.42.110.138 port 34212
Mar 25 23:27:37 ubnt-55d23 sshd[26465]: Failed password for invalid user postgres from 66.42.110.138 port 34212 ssh2
2020-03-26 07:31:16
66.42.111.220 attack
Unauthorized connection attempt detected from IP address 66.42.111.220 to port 445
2020-03-17 22:12:12
66.42.103.172 attackspam
Automatic report - Banned IP Access
2020-03-14 08:25:35
66.42.101.142 attack
*Port Scan* detected from 66.42.101.142 (US/United States/66.42.101.142.vultr.com). 4 hits in the last 15 seconds
2020-02-19 23:13:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.42.1.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12191
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.42.1.73.			IN	A

;; AUTHORITY SECTION:
.			436	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019093000 1800 900 604800 86400

;; Query time: 208 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 30 19:44:19 CST 2019
;; MSG SIZE  rcvd: 114
Host info
Host 73.1.42.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.1.42.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.250.148.154 attackspam
Jun  6 03:54:04 mx sshd[12395]: Failed password for root from 89.250.148.154 port 47262 ssh2
2020-06-06 20:05:17
123.126.113.160 attackspambots
Automatic report - Banned IP Access
2020-06-06 19:52:40
50.62.208.183 attack
GET /en/wp-includes/wlwmanifest.xml 404
2020-06-06 19:57:13
106.13.232.65 attackbots
$f2bV_matches
2020-06-06 20:12:46
113.247.138.250 attackbots
prod6
...
2020-06-06 19:54:44
182.151.58.230 attack
Jun  6 06:12:58 host sshd[22280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.58.230  user=root
Jun  6 06:13:00 host sshd[22280]: Failed password for root from 182.151.58.230 port 56890 ssh2
...
2020-06-06 19:46:31
167.172.238.159 attackbotsspam
<6 unauthorized SSH connections
2020-06-06 20:07:50
125.69.68.125 attackbotsspam
Jun  6 06:04:34 server sshd[31897]: Failed password for root from 125.69.68.125 port 15414 ssh2
Jun  6 06:08:26 server sshd[32197]: Failed password for root from 125.69.68.125 port 28636 ssh2
...
2020-06-06 20:14:48
139.199.80.75 attackbots
$f2bV_matches
2020-06-06 20:17:36
149.202.164.82 attackspambots
2020-06-06T10:17:02.693875ionos.janbro.de sshd[55265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=root
2020-06-06T10:17:04.600797ionos.janbro.de sshd[55265]: Failed password for root from 149.202.164.82 port 36054 ssh2
2020-06-06T10:20:38.561868ionos.janbro.de sshd[55280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=root
2020-06-06T10:20:41.121712ionos.janbro.de sshd[55280]: Failed password for root from 149.202.164.82 port 38894 ssh2
2020-06-06T10:24:06.527935ionos.janbro.de sshd[55300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=root
2020-06-06T10:24:07.973345ionos.janbro.de sshd[55300]: Failed password for root from 149.202.164.82 port 41734 ssh2
2020-06-06T10:27:36.143457ionos.janbro.de sshd[55332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14
...
2020-06-06 20:03:18
91.218.85.100 attackspam
IP 91.218.85.100 attacked honeypot on port: 23 at 6/6/2020 5:12:20 AM
2020-06-06 20:08:15
185.172.110.227 attackbots
 TCP (SYN) 185.172.110.227:38376 -> port 5502, len 44
2020-06-06 19:41:28
168.128.70.151 attackbotsspam
Jun  6 07:22:32 *** sshd[20930]: User root from 168.128.70.151 not allowed because not listed in AllowUsers
2020-06-06 20:14:18
173.201.196.184 attack
Automatic report - XMLRPC Attack
2020-06-06 19:56:54
195.231.81.43 attackbots
Jun  6 08:28:56 vps647732 sshd[11708]: Failed password for root from 195.231.81.43 port 59936 ssh2
...
2020-06-06 19:56:33

Recently Reported IPs

143.95.135.156 16.194.239.195 191.121.130.251 78.7.129.26
219.150.94.62 189.57.44.247 70.85.35.24 165.146.161.132
199.235.109.160 81.79.24.69 178.130.68.183 172.84.145.51
198.12.77.222 44.118.174.154 7.192.233.55 140.143.197.56
190.177.67.136 54.36.149.67 175.151.143.88 66.249.66.200