Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.48.218.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7456
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.48.218.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:09:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 138.218.48.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.218.48.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.57.6.67 attack
11/04/2019-10:04:29.774050 52.57.6.67 Protocol: 6 ET SCAN Potential SSH Scan
2019-11-04 23:06:14
94.142.17.47 attack
Chat Spam
2019-11-04 23:44:35
159.203.27.87 attackbots
159.203.27.87 - - \[04/Nov/2019:14:35:09 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
159.203.27.87 - - \[04/Nov/2019:14:35:10 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-04 23:43:54
185.176.27.166 attackbotsspam
firewall-block, port(s): 19004/tcp
2019-11-04 23:27:08
188.166.117.213 attackbotsspam
2019-11-04T16:06:50.481622host3.slimhost.com.ua sshd[1609485]: Failed password for root from 188.166.117.213 port 48046 ssh2
2019-11-04T16:10:33.756265host3.slimhost.com.ua sshd[1612594]: Invalid user master from 188.166.117.213 port 57650
2019-11-04T16:10:33.761940host3.slimhost.com.ua sshd[1612594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.117.213
2019-11-04T16:10:33.756265host3.slimhost.com.ua sshd[1612594]: Invalid user master from 188.166.117.213 port 57650
2019-11-04T16:10:36.081726host3.slimhost.com.ua sshd[1612594]: Failed password for invalid user master from 188.166.117.213 port 57650 ssh2
...
2019-11-04 23:19:03
92.207.180.50 attack
Nov  4 16:26:54 vps691689 sshd[28944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50
Nov  4 16:26:56 vps691689 sshd[28944]: Failed password for invalid user jordan23 from 92.207.180.50 port 45975 ssh2
Nov  4 16:31:28 vps691689 sshd[29026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.207.180.50
...
2019-11-04 23:38:43
45.136.108.66 attack
Connection by 45.136.108.66 on port: 8024 got caught by honeypot at 11/4/2019 1:55:04 PM
2019-11-04 23:11:13
45.148.10.24 attackspam
2019-11-04T16:06:04.367543mail01 postfix/smtpd[20903]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04T16:14:45.346208mail01 postfix/smtpd[17108]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04T16:15:03.042051mail01 postfix/smtpd[20903]: warning: unknown[45.148.10.24]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04 23:16:36
181.110.240.194 attackspam
2019-11-04T15:38:09.687374  sshd[24313]: Invalid user Dexter123 from 181.110.240.194 port 49624
2019-11-04T15:38:09.701030  sshd[24313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.110.240.194
2019-11-04T15:38:09.687374  sshd[24313]: Invalid user Dexter123 from 181.110.240.194 port 49624
2019-11-04T15:38:12.146338  sshd[24313]: Failed password for invalid user Dexter123 from 181.110.240.194 port 49624 ssh2
2019-11-04T15:43:21.601578  sshd[24348]: Invalid user carlos2 from 181.110.240.194 port 59808
...
2019-11-04 23:01:40
145.239.8.229 attackspam
Nov  4 10:18:37 TORMINT sshd\[19045\]: Invalid user justin from 145.239.8.229
Nov  4 10:18:37 TORMINT sshd\[19045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.8.229
Nov  4 10:18:40 TORMINT sshd\[19045\]: Failed password for invalid user justin from 145.239.8.229 port 39624 ssh2
...
2019-11-04 23:21:31
159.65.146.250 attackbots
Nov  4 16:28:10 legacy sshd[12749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.250
Nov  4 16:28:13 legacy sshd[12749]: Failed password for invalid user php1 from 159.65.146.250 port 33598 ssh2
Nov  4 16:33:09 legacy sshd[12932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.146.250
...
2019-11-04 23:41:39
84.232.53.109 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/84.232.53.109/ 
 
 ES - 1H : (36)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN29119 
 
 IP : 84.232.53.109 
 
 CIDR : 84.232.52.0/23 
 
 PREFIX COUNT : 705 
 
 UNIQUE IP COUNT : 461312 
 
 
 ATTACKS DETECTED ASN29119 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-04 15:35:10 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-04 23:43:28
190.72.184.19 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 04-11-2019 14:35:22.
2019-11-04 23:31:01
37.9.169.7 attackspambots
Automatic report - XMLRPC Attack
2019-11-04 23:22:51
190.202.226.9 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 04-11-2019 14:35:22.
2019-11-04 23:33:33

Recently Reported IPs

190.161.226.218 141.63.127.146 164.185.104.83 173.29.69.113
138.142.80.98 37.41.85.155 81.15.245.84 240.249.20.166
232.157.248.55 38.96.89.208 41.249.7.50 9.43.68.181
226.77.200.129 164.201.142.33 240.249.89.221 98.44.146.81
255.1.42.4 146.198.173.215 60.76.30.164 205.169.17.13