IP Address: 66.132.195.66


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
17 hours ago
[probe-44-49] 2026-05-23 06:00:36, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 days ago
[probe-44-49] 2026-05-20 10:01:50, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /r38bkd4pc8143sitv
PortScan
HTTP
4 days ago
[probe-44-49] 2026-05-19 11:28:06, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /doc/script/lib/seajs/config/sea-config.js
PortScan
HTTP
4 days ago
[probe-168-134] 2026-05-19 06:48:44, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /mhssfzp2cwwqfmlf3a
PortScan
HTTP
8 days ago
[probe-44-49] 2026-05-15 06:49:38, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 days ago
[probe-168-134] 2026-05-15 06:49:36, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 days ago
[probe-44-49] 2026-05-13 07:25:22, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
10 days ago
fail2ban
BruteForce, Hacking, PortScan
postfix
Anonymous
12 days ago
ipban 1.9.0 - 5152
BruteForce
RDP
13 days ago
fail2ban
BruteForce
apache-badscanners
17 days ago
[probe-44-49] 2026-05-06 07:51:34, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /va7clyxt9_05xoh
PortScan
HTTP
19 days ago
[probe-44-49] 2026-05-04 17:01:25, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
22 days ago
[probe-44-49] 2026-05-01 11:52:04, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /vnl_arc776il8
PortScan
HTTP
28 days ago
[probe-44-49] 2026-04-25 18:57:07, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
29 days ago
[probe-44-49] 2026-04-24 22:11:30, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-04-22 19:02:05, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-04-20 05:49:54, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-04-17 15:42:30, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-04-16 17:53:33, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-04-14 01:34:22, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
fail2ban
Hacking
HTTP
one month ago
[probe-44-49] 2026-04-02 09:47:58, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-30 08:01:05, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 1.9.0
BruteForce
Apache
Anonymous
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
[probe-68-69] 2026-03-27 09:49:29, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /e1s_x6wvziqu
PortScan
HTTP
RLorenz
2 months ago
ipbanpro 5.0.0 - 14
BruteForce
RDP
2 months ago
[rede-188] 2026-03-24 22:50:06, Client: 66.132.195.66, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
2 months ago
ipban 3.1.0 - 5152
BruteForce
RDP
Contact IPThreat