Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.81.102.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.81.102.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 12:23:23 CST 2025
;; MSG SIZE  rcvd: 105
Host info
73.102.81.66.in-addr.arpa domain name pointer 66-81-102-73.static-ip.telepacific.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.102.81.66.in-addr.arpa	name = 66-81-102-73.static-ip.telepacific.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.126.235.38 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-05 17:00:21
119.18.148.119 attackbots
Sending SPAM email
2019-09-05 16:46:40
185.173.35.33 attackspambots
Honeypot attack, port: 135, PTR: 185.173.35.33.netsystemsresearch.com.
2019-09-05 16:21:58
188.131.232.70 attackspam
Sep  4 20:23:31 friendsofhawaii sshd\[5659\]: Invalid user ftpadmin from 188.131.232.70
Sep  4 20:23:31 friendsofhawaii sshd\[5659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.232.70
Sep  4 20:23:33 friendsofhawaii sshd\[5659\]: Failed password for invalid user ftpadmin from 188.131.232.70 port 59142 ssh2
Sep  4 20:28:52 friendsofhawaii sshd\[6089\]: Invalid user user9 from 188.131.232.70
Sep  4 20:28:52 friendsofhawaii sshd\[6089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.232.70
2019-09-05 16:17:35
209.17.96.66 attackbotsspam
port scan and connect, tcp 5061 (sip-tls)
2019-09-05 16:35:04
118.117.29.66 attackspam
Distributed brute force attack
2019-09-05 16:38:39
120.88.185.39 attack
Sep  4 22:48:45 lcprod sshd\[28751\]: Invalid user demo from 120.88.185.39
Sep  4 22:48:45 lcprod sshd\[28751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.185.39
Sep  4 22:48:47 lcprod sshd\[28751\]: Failed password for invalid user demo from 120.88.185.39 port 55304 ssh2
Sep  4 22:53:21 lcprod sshd\[29106\]: Invalid user user from 120.88.185.39
Sep  4 22:53:21 lcprod sshd\[29106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.185.39
2019-09-05 17:00:47
203.195.134.40 attackbots
2019-09-05T18:34:50.149019luisaranguren sshd[13886]: Connection from 203.195.134.40 port 62238 on 10.10.10.6 port 22
2019-09-05T18:34:51.797972luisaranguren sshd[13886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.134.40  user=root
2019-09-05T18:34:53.175153luisaranguren sshd[13886]: Failed password for root from 203.195.134.40 port 62238 ssh2
2019-09-05T18:34:50.149019luisaranguren sshd[13886]: Connection from 203.195.134.40 port 62238 on 10.10.10.6 port 22
2019-09-05T18:34:51.797972luisaranguren sshd[13886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.134.40  user=root
2019-09-05T18:34:53.175153luisaranguren sshd[13886]: Failed password for root from 203.195.134.40 port 62238 ssh2
...
2019-09-05 16:55:38
118.69.35.171 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-04 22:35:41,662 INFO [amun_request_handler] PortScan Detected on Port: 445 (118.69.35.171)
2019-09-05 16:23:05
117.247.182.223 attackbots
Unauthorized connection attempt from IP address 117.247.182.223 on Port 445(SMB)
2019-09-05 16:45:41
42.51.224.210 attackspambots
Sep  5 00:40:23 aat-srv002 sshd[11705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.224.210
Sep  5 00:40:25 aat-srv002 sshd[11705]: Failed password for invalid user support from 42.51.224.210 port 48413 ssh2
Sep  5 00:45:46 aat-srv002 sshd[11865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.51.224.210
Sep  5 00:45:48 aat-srv002 sshd[11865]: Failed password for invalid user rustserver from 42.51.224.210 port 36994 ssh2
...
2019-09-05 16:25:34
151.80.238.201 attackspambots
Sep  5 06:57:11  postfix/smtpd: warning: unknown[151.80.238.201]: SASL LOGIN authentication failed
2019-09-05 16:31:50
109.228.143.179 attackbots
Sep  5 01:46:06 pkdns2 sshd\[14955\]: Invalid user mcserver from 109.228.143.179Sep  5 01:46:08 pkdns2 sshd\[14955\]: Failed password for invalid user mcserver from 109.228.143.179 port 22189 ssh2Sep  5 01:49:53 pkdns2 sshd\[15062\]: Invalid user alex from 109.228.143.179Sep  5 01:49:56 pkdns2 sshd\[15062\]: Failed password for invalid user alex from 109.228.143.179 port 24607 ssh2Sep  5 01:53:41 pkdns2 sshd\[15247\]: Invalid user ftpsecure from 109.228.143.179Sep  5 01:53:44 pkdns2 sshd\[15247\]: Failed password for invalid user ftpsecure from 109.228.143.179 port 26853 ssh2
...
2019-09-05 16:21:43
151.80.140.13 attackbots
Sep  4 12:50:03 eddieflores sshd\[3863\]: Invalid user webmaster from 151.80.140.13
Sep  4 12:50:03 eddieflores sshd\[3863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=contact.operapadrepio.it
Sep  4 12:50:05 eddieflores sshd\[3863\]: Failed password for invalid user webmaster from 151.80.140.13 port 41424 ssh2
Sep  4 12:53:59 eddieflores sshd\[4221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=contact.operapadrepio.it  user=root
Sep  4 12:54:01 eddieflores sshd\[4221\]: Failed password for root from 151.80.140.13 port 56236 ssh2
2019-09-05 16:12:35
190.147.159.34 attackspam
Sep  4 23:14:41 localhost sshd\[35828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34  user=root
Sep  4 23:14:43 localhost sshd\[35828\]: Failed password for root from 190.147.159.34 port 33141 ssh2
Sep  4 23:20:02 localhost sshd\[35975\]: Invalid user lrios from 190.147.159.34 port 54847
Sep  4 23:20:02 localhost sshd\[35975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.159.34
Sep  4 23:20:03 localhost sshd\[35975\]: Failed password for invalid user lrios from 190.147.159.34 port 54847 ssh2
...
2019-09-05 16:24:03

Recently Reported IPs

241.89.141.57 225.164.51.117 119.167.66.248 140.192.208.201
149.160.182.135 215.211.1.74 182.14.251.134 240.245.91.208
54.196.185.44 201.146.239.85 226.158.118.58 193.250.1.169
3.144.54.215 147.28.172.87 246.233.201.115 84.125.56.66
236.106.60.183 40.230.50.120 81.99.240.237 195.108.30.0