IP: 66.220.7.132 United States Location: Burson, California, United States
City:
Burson
Region:
California
Country:
United States
Postal Code:
95225
Latitude:
38.1892
Longitude:
-120.8953
NetRange: 66.220.0.0 - 66.220.31.255
CIDR: 66.220.0.0/19
NetName: HURRICANE-3
NetHandle: NET-66-220-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS6939
Organization: Hurricane Electric LLC (HURC)
RegDate: 2002-01-17
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/66.220.0.0

OrgName: Hurricane Electric LLC
OrgId: HURC
Address: 760 Mission Court
City: Fremont
StateProv: CA
PostalCode: 94539
Country: US
RegDate:
Updated: 2018-02-09
Ref: https://rdap.arin.net/registry/entity/HURC

ReferralServer: rwhois://rwhois.he.net:4321

OrgAbuseHandle: ABUSE1036-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-510-580-4100
OrgAbuseEmail: abuse@he.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1036-ARIN

OrgTechHandle: ZH17-ARIN
OrgTechName: Hurricane Electric
OrgTechPhone: +1-510-580-4100
OrgTechEmail: hostmaster@he.net
OrgTechRef: https://rdap.arin.net/registry/entity/ZH17-ARIN

RAbuseHandle: ABUSE1036-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-510-580-4100
RAbuseEmail: abuse@he.net
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1036-ARIN

RTechHandle: ZH17-ARIN
RTechName: Hurricane Electric
RTechPhone: +1-510-580-4100
RTechEmail: hostmaster@he.net
RTechRef: https://rdap.arin.net/registry/entity/ZH17-ARIN

RNOCHandle: ZH17-ARIN
RNOCName: Hurricane Electric
RNOCPhone: +1-510-580-4100
RNOCEmail: hostmaster@he.net
RNOCRef: https://rdap.arin.net/registry/entity/ZH17-ARIN
DNS BlackList results:
Most recent complaints on 66.220.7.132
Complaint by Jerry Johnson :

Someone from this IP attempted to hack my site via a SQL injection attack.

Reported on: 13th, Jan. 2013
Complaint by Mike Haffner :

Credit Card Fraud

Reported on: 11th, Mar. 2013
Complaint by Simac ICT - SOC :

SQL injection source. Typical "union all select" hit Context Data From attacker: Ether: ---- Ethernet2 OSI=2 Frame #1 Captured on 2013-02-11 18:53:03.245 ---- Data: 0000 73 70 78 3f 74 61 62 69 64 3d 39 39 39 39 39 39 spx?tabid=999999 Data: 0010 2e 39 25 32 30 75 6e 69 6f 6e 25 32 30 61 6c 6c .9%20union%20all Data: 0020 25 32 30 73 65 6c 65 63 74 25 32 30 30 78 33 31 %20select%200x31 Data: 0030 33 30 33 32 33 35 33 34 33 38 33 30 33 30 33 35 3032353438303035

Reported on: 14th, Mar. 2013
Complaint by Teppo :

Lame SQL Injection attempt..! UNION ALL SELECT ...

Reported on: 6th, Apr. 2013
Complaint by Anshuman :

We are also getting SQL injection attack from 66.220.7.132

Reported on: 9th, Apr. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 66.220.7.132 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.