Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Davenport

Region: Florida

Country: United States

Internet Service Provider: Telastic

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Unauthorized connection attempt detected from IP address 66.42.29.82 to port 23
2020-06-13 08:27:58
Comments on same subnet:
IP Type Details Datetime
66.42.29.248 attackbots
Unauthorized connection attempt detected from IP address 66.42.29.248 to port 23
2020-07-22 14:49:32
66.42.29.0 attack
Unauthorized connection attempt detected from IP address 66.42.29.0 to port 23
2020-06-29 02:45:21
66.42.29.165 attackbots
Unauthorized connection attempt detected from IP address 66.42.29.165 to port 5358
2020-05-13 04:16:40
66.42.29.72 attackbotsspam
Unauthorized connection attempt detected from IP address 66.42.29.72 to port 23
2020-04-13 04:02:55
66.42.29.159 attackspambots
Unauthorized connection attempt detected from IP address 66.42.29.159 to port 23
2020-01-06 18:09:12
66.42.29.145 attack
Telnet Server BruteForce Attack
2020-01-06 04:24:55
66.42.29.220 attackspambots
Unauthorized connection attempt detected from IP address 66.42.29.220 to port 23 [J]
2020-01-05 23:55:43
66.42.29.157 attackbotsspam
Unauthorized connection attempt detected from IP address 66.42.29.157 to port 23
2020-01-05 23:26:00
66.42.29.157 attack
Unauthorized connection attempt detected from IP address 66.42.29.157 to port 23
2019-12-29 08:23:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.42.29.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19754
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.42.29.82.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061201 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 13 08:27:53 CST 2020
;; MSG SIZE  rcvd: 115
Host info
82.29.42.66.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 82.29.42.66.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
46.101.249.232 attack
SSH Brute-Forcing (server2)
2020-03-11 20:53:09
1.55.108.2 attackspam
Attempted connection to ports 8291, 8728.
2020-03-11 20:36:16
184.168.221.39 attackspambots
SSH login attempts.
2020-03-11 20:42:23
64.98.36.182 attackbotsspam
SSH login attempts.
2020-03-11 20:31:04
51.75.123.107 attackbots
Mar 11 12:47:16 v22018086721571380 sshd[24231]: Failed password for invalid user factorio from 51.75.123.107 port 57182 ssh2
2020-03-11 20:41:41
104.47.58.138 attack
SSH login attempts.
2020-03-11 20:37:27
41.250.251.178 attack
Attempted connection to port 1433.
2020-03-11 21:06:13
223.196.176.242 attackspam
Attempted connection to port 3389.
2020-03-11 21:07:38
185.33.132.163 attackspam
SSH login attempts.
2020-03-11 21:04:14
178.87.16.65 attackspambots
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-11 20:39:57
184.171.128.12 attackspam
SSH login attempts.
2020-03-11 20:48:11
188.131.221.172 attack
Mar 11 11:38:08 v22018076622670303 sshd\[18559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.221.172  user=root
Mar 11 11:38:10 v22018076622670303 sshd\[18559\]: Failed password for root from 188.131.221.172 port 36290 ssh2
Mar 11 11:44:38 v22018076622670303 sshd\[18650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.221.172  user=root
...
2020-03-11 21:08:55
157.245.110.95 attack
2020-03-11T12:03:22.637126v22018076590370373 sshd[3507]: Failed password for root from 157.245.110.95 port 44652 ssh2
2020-03-11T12:06:38.060255v22018076590370373 sshd[13228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.110.95  user=root
2020-03-11T12:06:40.130011v22018076590370373 sshd[13228]: Failed password for root from 157.245.110.95 port 41466 ssh2
2020-03-11T12:09:44.511747v22018076590370373 sshd[23810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.110.95  user=root
2020-03-11T12:09:46.451703v22018076590370373 sshd[23810]: Failed password for root from 157.245.110.95 port 38146 ssh2
...
2020-03-11 21:16:19
173.201.193.129 attack
SSH login attempts.
2020-03-11 20:54:32
103.57.210.12 attackspam
Mar 11 12:41:22 lukav-desktop sshd\[4494\]: Invalid user test from 103.57.210.12
Mar 11 12:41:22 lukav-desktop sshd\[4494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.210.12
Mar 11 12:41:24 lukav-desktop sshd\[4494\]: Failed password for invalid user test from 103.57.210.12 port 54668 ssh2
Mar 11 12:44:51 lukav-desktop sshd\[4543\]: Invalid user test from 103.57.210.12
Mar 11 12:44:51 lukav-desktop sshd\[4543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.210.12
2020-03-11 20:38:20

Recently Reported IPs

26.30.189.89 47.68.233.145 184.226.31.204 58.248.203.203
92.41.74.69 54.193.243.18 42.178.214.11 100.3.48.241
105.95.2.188 46.253.163.21 54.193.33.56 124.153.221.46
186.82.93.185 54.185.135.254 73.59.156.206 54.183.146.68
13.211.180.233 86.83.130.151 83.94.154.237 46.236.65.120