IP Address: 66.132.153.141


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
ric404
yesterday
ipban 3.0.0 - 14
BruteForce
RDP
2 days ago
[probe-44-49] 2026-03-05 09:46:54, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /vc29e9k0d_86ds
PortScan
HTTP
Anonymous
3 days ago
fail2ban
Hacking
HTTP
5 days ago
[probe-44-49] 2026-03-02 17:01:58, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /_rul19hgg_iq6m8wi
PortScan
HTTP
6 days ago
[probe-44-49] 2026-03-01 07:42:41, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 days ago
[rede-188] 2026-03-01 06:54:05, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 days ago
Connection to port 23 from port 12294
BruteForce
Telnet
9 days ago
[probe-44-49] 2026-02-26 19:59:24, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
9 days ago
ipban 1.8.0 - 14
BruteForce
RDP
9 days ago
[probe-68-69] 2026-02-26 10:55:26, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 days ago
fail2ban
BruteForce
dovecot
13 days ago
[probe-44-49] 2026-02-22 06:44:24, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
NoirBit
15 days ago
ipban 2.0.0 - 14
BruteForce
RDP
NoirBit
16 days ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
18 days ago
ipban 1.8.0 - 14
BruteForce
RDP
20 days ago
[probe-44-49] 2026-02-15 01:00:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Tyler
20 days ago
ipban 3.1.0 - 14
BruteForce
RDP
22 days ago
fail2ban
BruteForce
dovecot
EugeneK
26 days ago
ipban 3.0.0 - 14
BruteForce
RDP
27 days ago
Connection to port 5900 from port 28222
BruteForce
VNC
27 days ago
[rede-188] 2026-02-08 05:00:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
28 days ago
[probe-168-134] 2026-02-06 23:06:28, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
29 days ago
[probe-68-69] 2026-02-06 20:48:08, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-03 23:30:27, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-03 13:44:05, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
one month ago
ipban 3.0.0 - 4653
BruteForce
RDP
one month ago
[probe-68-69] 2026-01-31 20:04:17, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /5tvanfc06fx
PortScan
HTTP
Anonymous
one month ago
ipban 3.0.0
BruteForce
Nginx
one month ago
[probe-44-49] 2026-01-26 19:02:33, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-26 09:02:32, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-22 08:04:58, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-01-20 04:27:31, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-01-13 01:04:39, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-01-10 08:07:10, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 1.8.0
BruteForce
RDP
ric404
2 months ago
ipban 3.0.0 - 14
BruteForce
RDP
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
2 months ago
[probe-68-69] 2025-12-31 11:10:15, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
Connection to port 23 from port 33890
BruteForce
Telnet
2 months ago
[arem1] 2025-12-17 12:56:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-68-69] 2025-12-15 11:13:04, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2025-12-15 06:10:24, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-68-69] 2025-12-11 07:03:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-12-03 13:29:27, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
fail2ban
BruteForce
postfix
3 months ago
[rede-188] 2025-11-21 14:52:26, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
fail2ban
BruteForce
postfix
3 months ago
[probe-168-134] 2025-11-19 01:03:54, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-11-18 00:34:02, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-11-12 17:55:59, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-68-69] 2025-11-08 11:00:22, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[rede-188] 2025-11-07 20:12:19, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
4 months ago
ipban 3.1.0 - 5152
BruteForce
RDP
4 months ago
[arem1] 2025-11-05 22:45:03, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
[arem1] 2025-10-30 19:12:19, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
4 months ago
ipban 3.1.0 - 5152
BruteForce
RDP
4 months ago
[rede-188] 2025-10-25 08:19:05, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
fail2ban
BruteForce
dovecot
4 months ago
Connection to port 3306 from port 44138
BruteForce
MySQL
4 months ago
[probe-68-69] 2025-10-21 11:10:02, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
4 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
4 months ago
[arem1] 2025-10-17 06:27:07, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[rede-188] 2025-10-16 05:48:37, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
4 months ago
ipban 1.8.0 - 14
BruteForce
RDP
Anonymous
4 months ago
ipbanpro 4.3.0
BruteForce
Apache
imcas
4 months ago
ipban 3.1.0 - 5152
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.0 - 14
BruteForce
RDP
5 months ago
[probe-168-134] 2025-10-02 04:58:04, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-09-27 15:57:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
imcas
5 months ago
ipban 3.1.0 - 5152
BruteForce
RDP
5 months ago
[probe-68-69] 2025-09-24 08:57:35, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-09-22 09:04:50, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
5 months ago
[rede-188] 2025-09-18 18:13:50, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-15 00:55:51, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
5 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
5 months ago
[probe-168-134] 2025-09-12 12:55:56, Client: 66.132.153.141, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Contact IPThreat