Whois information
NetRange: 66.230.192.0 - 66.230.239.255
CIDR: 66.230.224.0/20, 66.230.192.0/19
NetName: NEUCOM
NetHandle: NET-66-230-192-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Neucom, Inc. (NEUC)
RegDate: 2002-02-22
Updated: 2025-03-17
Ref: https://rdap.arin.net/registry/ip/66.230.192.0
OrgName: Neucom, Inc.
OrgId: NEUC
Address: 412 East Madison Street
Address: Suite 1200
City: Tampa
StateProv: FL
PostalCode: 33602
Country: US
RegDate: 2001-06-27
Updated: 2025-03-17
Ref: https://rdap.arin.net/registry/entity/NEUC
OrgAbuseHandle: NETWO276-ARIN
OrgAbuseName: Network Operations
OrgAbusePhone: +1-813-386-2991
OrgAbuseEmail: netops@desync.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO276-ARIN
OrgTechHandle: NETWO276-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-813-386-2991
OrgTechEmail: netops@desync.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO276-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 66.230.192.172 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by steve :
20:24:52 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/FCKeditor [Fri Mar 02 20:24:51 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/fckeditor [Fri Mar 02 20:24:51 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/faq [Fri Mar 02 20:24:51 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/editor [Fri Mar 02 20:24:50 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/cms [Fri Mar 02 20:24:50 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/album [Fri Mar 02 20:24:50 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/ajaxfilemanager [Fri Mar 02 20:24:49 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/aidicms [Fri Mar 02 20:24:49 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/admin [Fri Mar 02 20:24:49 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/admin [Fri Mar 02 20:24:48 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/admin [Fri Mar 02 20:24:48 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/admin [Fri Mar 02 20:24:48 2012] [error] [client 66.230.192.172] File does not exist: /home/xxxx/public_html/addons
Complaint by z-z-z :
Siteprotect? Sitprotect?!! This looks like a hack attempt. If it is, it's the most elaborate and diversified one I've seen in months. Here are some examples: GET //FCKeditor/editor//plugins/ajaxfilemanager/jscripts/edit_area/edit_area.css GET //ajaxfilemanager/jscripts/tiny_mce//plugins/ajaxfilemanager/jscripts/edit_area/edit_area.css GET //shop/admin/includes/javascript/tiny_mce//plugins/ajaxfilemanager/jscripts/edit_area/edit_area.css GET //gallery/zp-core/zp-extensions/tiny_mce//plugins/ajaxfilemanager/jscripts/edit_area/edit_area.css There are lots and lots more of this. I don't know what the provider stands for, but they need (urgently!) to shut down this computer (if they are honest).
Complaint by aaaaaaaa :
a lot of variations on: 66.230.192.172 tried to load //javascript/tinymce/jscripts/tiny_mce//plugins/ajaxfilemanager/jscripts/edit_area/edit_area.css
Complaint by z-z-z :
Hacker, or infected PC -- fact is they are still at it. This time it's GET ///includes/xml/bitfield_vbseo.xml GET //forum//includes/xml/bitfield_vbseo.xml GET //forums//includes/xml/bitfield_vbseo.xml GET //vb//includes/xml/bitfield_vbseo.xml GET //vBulletin//includes/xml/bitfield_vbseo.xml GET //vbulletin//includes/xml/bitfield_vbseo.xml Hard to believe the provider isn't aware of this, by now...