Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
66.70.253.4 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 66.70.253.4 (ip4.ip-66-70-253.net): 5 in the last 3600 secs - Wed Jul 25 06:00:33 2018
2020-02-24 22:48:33
66.70.250.106 attack
1433/tcp 445/tcp...
[2019-10-07/12-02]10pkt,2pt.(tcp)
2019-12-02 18:49:04
66.70.254.229 attackbotsspam
Time:     Sun Nov  3 12:48:39 2019 -0300
IP:       66.70.254.229 (CA/Canada/ip229.ip-66-70-254.net)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-11-04 04:57:00
66.70.254.229 attack
2019-09-29 15:49:31 dovecot_login authenticator failed for ip229.ip-66-70-254.net (xG4RSmCej8) [66.70.254.229]:53395 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=algonzalez@lerctr.org)
2019-09-29 15:49:48 dovecot_login authenticator failed for ip229.ip-66-70-254.net (AvaJbMi) [66.70.254.229]:62847 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=algonzalez@lerctr.org)
2019-09-29 15:50:09 dovecot_login authenticator failed for ip229.ip-66-70-254.net (RnMcVoIw53) [66.70.254.229]:57586 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=algonzalez@lerctr.org)
...
2019-09-30 07:14:58
66.70.250.55 attackbots
Aug  8 06:41:19 SilenceServices sshd[16299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.250.55
Aug  8 06:41:21 SilenceServices sshd[16299]: Failed password for invalid user testuser from 66.70.250.55 port 59700 ssh2
Aug  8 06:47:56 SilenceServices sshd[21670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.250.55
2019-08-08 19:02:37
66.70.250.55 attack
Aug  3 13:41:29 ubuntu-2gb-nbg1-dc3-1 sshd[31207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.250.55
Aug  3 13:41:31 ubuntu-2gb-nbg1-dc3-1 sshd[31207]: Failed password for invalid user user from 66.70.250.55 port 49078 ssh2
...
2019-08-03 19:55:43
66.70.255.6 attackspam
firewall-block, port(s): 445/tcp
2019-07-27 11:56:41
66.70.250.55 attackspambots
Jul 26 21:46:58 [munged] sshd[30303]: Failed password for root from 66.70.250.55 port 57386 ssh2
2019-07-27 07:54:48
66.70.255.189 attackspam
abuse-sasl
2019-07-16 20:41:13
66.70.254.229 attackspambots
attempt smtpd hack
2019-06-25 01:41:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.70.25.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.70.25.105.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 15:18:34 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 105.25.70.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.25.70.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.211.94.74 attackbots
Honeypot attack, port: 445, PTR: spb-81-211-94-74.sovintel.ru.
2020-01-18 21:49:08
152.249.121.50 attack
Unauthorized connection attempt detected from IP address 152.249.121.50 to port 2220 [J]
2020-01-18 22:08:35
190.85.15.251 attackbotsspam
Unauthorized connection attempt detected from IP address 190.85.15.251 to port 2220 [J]
2020-01-18 21:32:44
165.22.251.121 attack
Automatic report - XMLRPC Attack
2020-01-18 21:36:18
197.45.117.66 attackbotsspam
Honeypot attack, port: 445, PTR: host-197.45.117.66.tedata.net.
2020-01-18 21:58:47
66.249.155.244 attack
Invalid user mango from 66.249.155.244 port 54764
2020-01-18 21:54:32
180.254.14.109 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 21:44:50
191.54.216.106 attackspambots
Invalid user admin from 191.54.216.106 port 47276
2020-01-18 21:59:30
189.76.186.120 attackspambots
Invalid user admin from 189.76.186.120 port 46852
2020-01-18 22:00:37
94.229.66.131 attackspam
Automatic report - Banned IP Access
2020-01-18 21:43:36
182.156.209.222 attackbotsspam
Invalid user gp from 182.156.209.222 port 17050
2020-01-18 22:03:15
179.178.221.11 attack
1579352366 - 01/18/2020 13:59:26 Host: 179.178.221.11/179.178.221.11 Port: 445 TCP Blocked
2020-01-18 22:04:38
182.61.105.89 attackbots
Invalid user dark from 182.61.105.89 port 58352
2020-01-18 22:03:37
150.242.74.214 attack
Honeypot attack, port: 445, PTR: dhcp.tripleplay.in.
2020-01-18 21:31:23
222.186.15.158 attack
Unauthorized connection attempt detected from IP address 222.186.15.158 to port 22 [J]
2020-01-18 21:48:01

Recently Reported IPs

142.2.234.46 80.137.199.8 50.151.128.40 43.224.249.214
11.107.56.17 128.243.190.74 190.99.231.62 200.118.62.42
183.171.183.165 245.106.151.92 230.144.254.21 161.253.116.113
190.253.223.33 131.4.1.209 132.32.214.156 68.183.188.247
61.240.202.35 1.0.146.14 1.0.233.180 1.0.210.232