Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vancouver

Region: British Columbia

Country: Canada

Internet Service Provider: Telus

Hostname: unknown

Organization: TELUS Communications Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.172.207.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45083
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.172.207.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 23 00:15:21 CST 2019
;; MSG SIZE  rcvd: 118

Host info
66.207.172.108.in-addr.arpa domain name pointer d108-172-207-66.bchsia.telus.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.207.172.108.in-addr.arpa	name = d108-172-207-66.bchsia.telus.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
85.93.20.34 attack
21 attempts against mh_ha-misbehave-ban on dawn
2020-02-09 23:43:36
81.170.246.37 attackspam
23/tcp 23/tcp
[2020-02-09]2pkt
2020-02-10 00:08:34
220.132.176.120 attackbots
81/tcp
[2020-02-09]1pkt
2020-02-10 00:10:00
196.179.230.10 attackspam
Unauthorised access (Feb  9) SRC=196.179.230.10 LEN=48 TTL=113 ID=29611 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-09 23:40:01
218.92.0.158 attack
Feb  9 17:15:51 * sshd[8882]: Failed password for root from 218.92.0.158 port 10053 ssh2
Feb  9 17:16:04 * sshd[8882]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 10053 ssh2 [preauth]
2020-02-10 00:19:46
114.143.230.186 attackbotsspam
Brute force attempt
2020-02-09 23:36:12
84.6.207.114 attack
60001/tcp
[2020-02-09]1pkt
2020-02-09 23:48:28
164.68.112.32 attackspambots
53413/udp 53413/udp
[2020-02-09]2pkt
2020-02-09 23:55:37
128.199.44.102 attackspam
Feb  9 10:58:40 plusreed sshd[4403]: Invalid user rb from 128.199.44.102
...
2020-02-10 00:14:00
5.59.146.4 attackspam
Brute force attempt
2020-02-09 23:40:37
221.191.235.146 attackspambots
60001/tcp
[2020-02-09]1pkt
2020-02-10 00:02:47
212.92.115.107 attackbots
RDPBruteCAu
2020-02-10 00:08:55
190.186.21.182 attackspam
Brute force attempt
2020-02-09 23:41:39
114.35.76.122 attackbots
Automatic report - Port Scan Attack
2020-02-09 23:44:51
77.246.102.140 attackbotsspam
Feb  9 16:53:53 mout sshd[8301]: Invalid user xim from 77.246.102.140 port 60980
2020-02-10 00:06:53

Recently Reported IPs

93.188.143.193 31.32.166.218 51.77.220.167 196.202.44.117
84.192.155.249 191.214.113.186 64.80.169.146 183.149.236.5
176.117.112.3 123.208.106.198 177.69.218.172 38.9.73.66
160.226.220.99 206.42.80.102 71.159.71.88 36.226.225.7
197.39.175.184 219.70.53.116 200.243.118.64 204.219.54.78