Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Telastic

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt detected from IP address 66.42.21.246 to port 23
2019-12-30 02:26:03
Comments on same subnet:
IP Type Details Datetime
66.42.21.47 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.47 to port 23
2020-06-13 06:00:44
66.42.21.59 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.59 to port 23
2020-05-30 03:07:43
66.42.21.92 attack
Unauthorized connection attempt detected from IP address 66.42.21.92 to port 23
2020-05-13 04:17:03
66.42.21.158 attackspambots
Unauthorized connection attempt detected from IP address 66.42.21.158 to port 23
2020-05-13 03:00:38
66.42.21.59 attackspam
Unauthorized connection attempt detected from IP address 66.42.21.59 to port 23
2020-05-13 01:44:20
66.42.21.51 attackspambots
Unauthorized connection attempt detected from IP address 66.42.21.51 to port 23
2020-05-12 23:06:59
66.42.21.170 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.170 to port 23
2020-04-13 04:39:04
66.42.21.158 attack
Unauthorized connection attempt detected from IP address 66.42.21.158 to port 23
2020-04-13 02:46:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.42.21.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.42.21.246.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122900 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 30 02:25:58 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 246.21.42.66.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 246.21.42.66.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
1.196.113.167 attack
account brute force by foreign IP
2019-08-06 10:41:01
36.62.211.216 attackspam
account brute force by foreign IP
2019-08-06 10:39:00
176.134.240.53 attack
2019-08-06T01:35:33.197287abusebot-6.cloudsearch.cf sshd\[13684\]: Invalid user ya from 176.134.240.53 port 52968
2019-08-06 10:48:14
167.99.194.54 attackspambots
Aug  6 04:06:45 vmd17057 sshd\[7898\]: Invalid user alejandra from 167.99.194.54 port 48806
Aug  6 04:06:45 vmd17057 sshd\[7898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.194.54
Aug  6 04:06:48 vmd17057 sshd\[7898\]: Failed password for invalid user alejandra from 167.99.194.54 port 48806 ssh2
...
2019-08-06 10:21:33
124.113.217.254 attackbots
account brute force by foreign IP
2019-08-06 10:44:35
114.40.111.101 attackbots
Honeypot attack, port: 23, PTR: 114-40-111-101.dynamic-ip.hinet.net.
2019-08-06 10:54:23
132.145.21.100 attackspambots
Aug  6 03:35:57 cp sshd[26263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.21.100
2019-08-06 10:23:33
195.154.114.153 attackbotsspam
Honeypot attack, application: ssdp, PTR: 195-154-114-153.rev.poneytelecom.eu.
2019-08-06 10:47:30
153.36.236.151 attack
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:07.875250wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:07.875250wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-2
2019-08-06 11:04:11
121.232.194.153 attackbotsspam
account brute force by foreign IP
2019-08-06 10:45:06
153.36.236.234 attackbotsspam
2019-07-11T23:56:36.288696wiz-ks3 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
2019-07-11T23:56:38.262612wiz-ks3 sshd[3080]: Failed password for root from 153.36.236.234 port 23354 ssh2
2019-07-11T23:56:40.859414wiz-ks3 sshd[3080]: Failed password for root from 153.36.236.234 port 23354 ssh2
2019-07-11T23:56:36.288696wiz-ks3 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
2019-07-11T23:56:38.262612wiz-ks3 sshd[3080]: Failed password for root from 153.36.236.234 port 23354 ssh2
2019-07-11T23:56:40.859414wiz-ks3 sshd[3080]: Failed password for root from 153.36.236.234 port 23354 ssh2
2019-07-11T23:56:36.288696wiz-ks3 sshd[3080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.234  user=root
2019-07-11T23:56:38.262612wiz-ks3 sshd[3080]: Failed password for root from 153.36.236.234 port 23354 ssh2
2019-07-1
2019-08-06 10:42:34
223.247.94.182 attackbotsspam
account brute force by foreign IP
2019-08-06 10:41:59
121.233.251.35 attack
account brute force by foreign IP
2019-08-06 11:01:55
115.213.153.151 attack
account brute force by foreign IP
2019-08-06 10:56:28
182.35.84.137 attackspambots
account brute force by foreign IP
2019-08-06 10:57:03

Recently Reported IPs

191.211.102.134 191.23.63.103 189.188.151.59 189.111.16.214
189.0.34.24 187.178.243.119 183.109.146.107 179.110.190.238
178.166.75.137 178.57.171.55 176.59.67.127 175.210.215.36
159.203.4.53 151.234.139.40 148.255.101.148 119.206.100.152
109.242.231.215 108.84.16.222 103.52.217.136 98.109.55.209