Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Telastic

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 66.42.20.43 to port 23
2020-04-13 00:45:51
Comments on same subnet:
IP Type Details Datetime
66.42.20.40 attack
Unauthorized connection attempt detected from IP address 66.42.20.40 to port 23
2020-07-07 03:43:11
66.42.20.20 attackbots
Unauthorized connection attempt detected from IP address 66.42.20.20 to port 23
2020-05-30 03:08:09
66.42.20.199 attackbots
Unauthorized connection attempt detected from IP address 66.42.20.199 to port 23
2020-04-13 04:39:25
66.42.20.121 attackbots
Unauthorized connection attempt detected from IP address 66.42.20.121 to port 23
2020-04-13 01:23:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.42.20.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.42.20.43.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041200 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 00:45:47 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 43.20.42.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.20.42.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.88.46.226 attack
Aug 14 11:14:22 webhost01 sshd[14470]: Failed password for root from 120.88.46.226 port 59466 ssh2
...
2020-08-14 12:38:31
62.112.11.86 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-14T03:14:32Z and 2020-08-14T03:42:09Z
2020-08-14 12:28:36
195.54.161.75 attackspam
[H1] Blocked by UFW
2020-08-14 12:34:29
203.99.62.158 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-08-14 12:57:39
187.177.62.112 attackbots
Automatic report - Port Scan Attack
2020-08-14 13:06:25
49.233.197.193 attackspambots
Aug 14 06:21:39 ip106 sshd[3486]: Failed password for root from 49.233.197.193 port 43788 ssh2
...
2020-08-14 12:44:17
210.183.21.48 attack
Aug 14 06:20:53 eventyay sshd[22756]: Failed password for root from 210.183.21.48 port 29868 ssh2
Aug 14 06:22:40 eventyay sshd[22785]: Failed password for root from 210.183.21.48 port 1592 ssh2
...
2020-08-14 12:34:04
51.158.190.54 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-14T03:34:54Z and 2020-08-14T03:42:11Z
2020-08-14 12:42:49
222.186.180.41 attackspam
Aug 14 06:45:52 jane sshd[28706]: Failed password for root from 222.186.180.41 port 55950 ssh2
Aug 14 06:45:57 jane sshd[28706]: Failed password for root from 222.186.180.41 port 55950 ssh2
...
2020-08-14 12:47:13
62.210.185.4 attackspam
CMS (WordPress or Joomla) login attempt.
2020-08-14 13:00:06
142.93.215.22 attackspam
Aug 14 05:53:35 nextcloud sshd\[27464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.22  user=root
Aug 14 05:53:37 nextcloud sshd\[27464\]: Failed password for root from 142.93.215.22 port 57954 ssh2
Aug 14 05:58:06 nextcloud sshd\[31894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.215.22  user=root
2020-08-14 12:24:44
49.83.241.73 attackbotsspam
Lines containing failures of 49.83.241.73
Aug 13 23:35:59 penfold sshd[17214]: Bad protocol version identification '' from 49.83.241.73 port 56868
Aug 13 23:36:08 penfold sshd[17215]: Invalid user NetLinx from 49.83.241.73 port 57479
Aug 13 23:36:10 penfold sshd[17215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.241.73 
Aug 13 23:36:11 penfold sshd[17215]: Failed password for invalid user NetLinx from 49.83.241.73 port 57479 ssh2
Aug 13 23:36:13 penfold sshd[17215]: Connection closed by invalid user NetLinx 49.83.241.73 port 57479 [preauth]
Aug 13 23:36:20 penfold sshd[17221]: Invalid user netscreen from 49.83.241.73 port 35054
Aug 13 23:36:21 penfold sshd[17221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.241.73 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.241.73
2020-08-14 12:44:54
72.210.252.152 attackbots
Dovecot Invalid User Login Attempt.
2020-08-14 13:07:44
186.92.48.45 attackbots
Unauthorised access (Aug 14) SRC=186.92.48.45 LEN=52 TTL=52 ID=24019 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-14 13:01:50
91.229.112.8 attackspambots
Port-scan: detected 259 distinct ports within a 24-hour window.
2020-08-14 12:54:12

Recently Reported IPs

211.248.241.21 211.192.180.178 211.185.84.43 196.219.113.248
193.176.215.137 190.214.1.76 189.226.4.158 189.177.169.220
189.159.126.67 189.156.70.249 189.144.93.236 187.136.191.130
183.82.101.231 179.99.8.109 179.93.173.49 179.56.28.196
121.147.140.66 177.207.136.252 12.143.140.229 177.55.156.82