AbuseIPDB » 66.222.178.21

Check an IP Address, Domain Name, or Subnet

e.g. 44.200.175.255, microsoft.com, or 5.188.10.0/24

66.222.178.21 was found in our database!

This IP was reported 160 times. Confidence of Abuse is 100%: ?

100%
ISP Telus Communications Inc.
Usage Type Unknown
Hostname(s) d66-222-178-21.abhsia.telus.net
Domain Name telus.com
Country Canada
City Medicine Hat, Alberta

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 66.222.178.21:

This IP address has been reported a total of 160 times from 89 distinct sources. 66.222.178.21 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
H41F4
Invalid user admin from 66.222.178.21 port 41852
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 34413
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 41852
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 34413
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 41852
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 34413
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 41852
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 34413
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 41852
Brute-Force SSH
H41F4
Invalid user admin from 66.222.178.21 port 34413
Brute-Force SSH
node-ray
Attempted to connect to endleSSH SSH tarpit
Brute-Force SSH
Anonymous
Brute-Force SSH
Hirte
RDM-W: TCP-Scanner. Port: 22
Port Scan
formality
Invalid user admin from 66.222.178.21 port 50253
Brute-Force SSH
Anonymous
port scan and connect, tcp 22 (ssh)
Port Scan

Showing 1 to 15 of 160 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com