Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Missouri

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.195.66.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29961
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.195.66.211.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019043000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 01:17:07 +08 2019
;; MSG SIZE  rcvd: 118

Host info
211.66.195.108.in-addr.arpa domain name pointer 108-195-66-211.lightspeed.mssnks.sbcglobal.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
211.66.195.108.in-addr.arpa	name = 108-195-66-211.lightspeed.mssnks.sbcglobal.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
177.152.124.23 attack
Aug 18 14:35:20 havingfunrightnow sshd[2731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23 
Aug 18 14:35:22 havingfunrightnow sshd[2731]: Failed password for invalid user dhg from 177.152.124.23 port 34592 ssh2
Aug 18 14:44:46 havingfunrightnow sshd[2964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23 
...
2020-08-18 21:25:08
118.244.195.141 attackbots
Aug 18 14:35:23  sshd\[17926\]: User root from 118.244.195.141 not allowed because not listed in AllowUsersAug 18 14:35:25  sshd\[17926\]: Failed password for invalid user root from 118.244.195.141 port 29395 ssh2
...
2020-08-18 21:14:03
51.83.133.24 attackbotsspam
Aug 18 14:33:50 buvik sshd[16697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.133.24
Aug 18 14:33:52 buvik sshd[16697]: Failed password for invalid user hamza from 51.83.133.24 port 50408 ssh2
Aug 18 14:37:02 buvik sshd[17195]: Invalid user lyl from 51.83.133.24
...
2020-08-18 21:17:43
212.70.149.20 attackspambots
Aug 18 13:17:32 mail postfix/smtpd[23386]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: generic failure
Aug 18 13:17:38 mail postfix/smtpd[23387]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: generic failure
Aug 18 13:17:59 mail postfix/smtpd[23386]: warning: unknown[212.70.149.20]: SASL LOGIN authentication failed: generic failure
...
2020-08-18 21:20:02
178.32.221.142 attackspambots
Automatic report - Banned IP Access
2020-08-18 21:29:32
111.93.235.74 attack
Aug 18 15:35:15 sso sshd[18623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74
Aug 18 15:35:17 sso sshd[18623]: Failed password for invalid user xcc from 111.93.235.74 port 65309 ssh2
...
2020-08-18 21:37:45
72.135.208.118 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-08-18 21:07:41
84.184.81.174 attack
SSH login attempts.
2020-08-18 21:16:56
104.155.213.9 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-18 21:04:25
113.161.29.9 attack
SSH invalid-user multiple login try
2020-08-18 21:00:25
106.55.168.232 attackbotsspam
2020-08-18T14:35:38.465950ks3355764 sshd[11230]: Invalid user kmk from 106.55.168.232 port 52646
2020-08-18T14:35:40.737980ks3355764 sshd[11230]: Failed password for invalid user kmk from 106.55.168.232 port 52646 ssh2
...
2020-08-18 21:01:10
218.92.0.148 attackspambots
Aug 18 05:35:26 dignus sshd[25466]: Failed password for root from 218.92.0.148 port 13335 ssh2
Aug 18 05:35:28 dignus sshd[25466]: Failed password for root from 218.92.0.148 port 13335 ssh2
Aug 18 05:35:31 dignus sshd[25508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.148  user=root
Aug 18 05:35:33 dignus sshd[25508]: Failed password for root from 218.92.0.148 port 38625 ssh2
Aug 18 05:35:36 dignus sshd[25508]: Failed password for root from 218.92.0.148 port 38625 ssh2
...
2020-08-18 21:04:08
64.225.64.215 attack
Aug 18 12:35:13 scw-6657dc sshd[11864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.64.215
Aug 18 12:35:13 scw-6657dc sshd[11864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.64.215
Aug 18 12:35:16 scw-6657dc sshd[11864]: Failed password for invalid user www from 64.225.64.215 port 36648 ssh2
...
2020-08-18 21:21:40
84.185.233.251 attack
SSH login attempts.
2020-08-18 21:18:59
36.255.159.150 attackspam
Unauthorized connection attempt from IP address 36.255.159.150 on port 587
2020-08-18 21:29:08

Recently Reported IPs

37.247.103.197 186.231.142.36 104.227.35.162 35.150.239.150
179.36.71.45 62.28.141.212 134.19.203.167 197.50.37.253
10.147.0.74 106.44.170.48 184.22.151.115 172.85.101.140
82.238.8.60 62.148.158.132 183.55.255.52 200.6.136.3
180.35.10.205 83.194.191.121 113.213.89.203 114.239.244.12