Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Telastic

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 66.42.21.92 to port 23
2020-05-13 04:17:03
Comments on same subnet:
IP Type Details Datetime
66.42.21.47 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.47 to port 23
2020-06-13 06:00:44
66.42.21.59 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.59 to port 23
2020-05-30 03:07:43
66.42.21.158 attackspambots
Unauthorized connection attempt detected from IP address 66.42.21.158 to port 23
2020-05-13 03:00:38
66.42.21.59 attackspam
Unauthorized connection attempt detected from IP address 66.42.21.59 to port 23
2020-05-13 01:44:20
66.42.21.51 attackspambots
Unauthorized connection attempt detected from IP address 66.42.21.51 to port 23
2020-05-12 23:06:59
66.42.21.170 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.170 to port 23
2020-04-13 04:39:04
66.42.21.158 attack
Unauthorized connection attempt detected from IP address 66.42.21.158 to port 23
2020-04-13 02:46:16
66.42.21.246 attackspam
Unauthorized connection attempt detected from IP address 66.42.21.246 to port 23
2019-12-30 02:26:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.42.21.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.42.21.92.			IN	A

;; AUTHORITY SECTION:
.			441	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051201 1800 900 604800 86400

;; Query time: 143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 04:16:56 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 92.21.42.66.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 92.21.42.66.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
167.114.3.105 attackbots
Jul 16 18:17:16 fhem-rasp sshd[23243]: Invalid user ftpuser2 from 167.114.3.105 port 60600
...
2020-07-17 02:57:12
41.41.228.220 attackspambots
Attempted connection to port 445.
2020-07-17 03:06:51
201.217.212.178 attackspambots
Unauthorized connection attempt from IP address 201.217.212.178 on Port 445(SMB)
2020-07-17 02:56:04
52.136.123.132 attackspambots
port scan and connect, tcp 22 (ssh)
2020-07-17 03:09:34
85.105.232.220 attackspambots
1594909409 - 07/16/2020 16:23:29 Host: 85.105.232.220/85.105.232.220 Port: 445 TCP Blocked
2020-07-17 02:55:18
182.176.176.51 attack
Unauthorized connection attempt from IP address 182.176.176.51 on Port 445(SMB)
2020-07-17 03:08:55
180.251.66.149 attackbots
Attempted connection to port 445.
2020-07-17 03:18:36
106.13.68.101 attack
Jul 16 18:35:55 ovpn sshd\[17049\]: Invalid user db2fenc1 from 106.13.68.101
Jul 16 18:35:55 ovpn sshd\[17049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.101
Jul 16 18:35:57 ovpn sshd\[17049\]: Failed password for invalid user db2fenc1 from 106.13.68.101 port 42055 ssh2
Jul 16 18:57:13 ovpn sshd\[22372\]: Invalid user vitiello from 106.13.68.101
Jul 16 18:57:13 ovpn sshd\[22372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.68.101
2020-07-17 02:54:58
190.164.156.197 attackbots
Attempted connection to port 5555.
2020-07-17 03:15:26
181.48.18.130 attackbotsspam
Jul 16 20:45:41 webhost01 sshd[9888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.130
Jul 16 20:45:44 webhost01 sshd[9888]: Failed password for invalid user qy from 181.48.18.130 port 39184 ssh2
...
2020-07-17 02:49:50
114.33.246.24 attack
Unauthorized connection attempt from IP address 114.33.246.24 on Port 445(SMB)
2020-07-17 02:52:38
49.149.74.70 attack
Unauthorized connection attempt from IP address 49.149.74.70 on Port 445(SMB)
2020-07-17 03:23:21
70.37.108.50 attackbots
Jul 16 19:22:43 ns382633 sshd\[19951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.108.50  user=root
Jul 16 19:22:45 ns382633 sshd\[19951\]: Failed password for root from 70.37.108.50 port 22774 ssh2
Jul 16 20:01:28 ns382633 sshd\[29511\]: Invalid user admin from 70.37.108.50 port 63104
Jul 16 20:01:28 ns382633 sshd\[29511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.108.50
Jul 16 20:01:30 ns382633 sshd\[29511\]: Failed password for invalid user admin from 70.37.108.50 port 63104 ssh2
2020-07-17 03:16:05
189.163.69.92 attackspambots
Automatic report - Port Scan Attack
2020-07-17 03:08:29
40.87.122.61 attackspam
2020-07-16 13:13:20.021625-0500  localhost sshd[14917]: Failed password for root from 40.87.122.61 port 42796 ssh2
2020-07-17 02:59:15

Recently Reported IPs

4.28.130.187 11.196.236.120 14.35.253.234 41.44.199.159
223.65.78.183 84.88.224.245 131.53.86.78 5.57.230.61
45.78.205.57 61.35.196.222 63.132.143.70 2.177.60.68
163.226.68.177 109.33.22.106 222.105.52.84 221.132.18.37
254.101.45.62 158.49.29.8 220.83.207.33 98.210.148.203