Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.221.82.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.221.82.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 07:35:18 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.82.221.12.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 66.82.221.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
119.196.83.14 attack
SSH Brute-Forcing (ownc)
2019-08-09 09:40:33
36.156.24.97 attack
fire
2019-08-09 09:11:53
217.13.56.254 attackbotsspam
Multiple failed RDP login attempts
2019-08-09 09:19:05
192.144.151.30 attack
Aug  9 03:09:24 srv206 sshd[4035]: Invalid user wpuser from 192.144.151.30
...
2019-08-09 09:19:20
157.230.104.176 attackspam
Aug  8 22:48:22 XXX sshd[29748]: Invalid user ma from 157.230.104.176 port 58758
2019-08-09 09:17:56
139.162.77.6 attackspambots
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-09 09:33:38
223.111.139.247 attackbotsspam
fire
2019-08-09 09:27:38
94.24.38.96 attackbots
firewall-block, port(s): 21/tcp, 22/tcp, 80/tcp, 8080/tcp
2019-08-09 09:21:20
189.79.185.6 attack
port scan and connect, tcp 8080 (http-proxy)
2019-08-09 09:47:05
36.156.24.99 attack
fire
2019-08-09 09:07:21
62.4.13.108 attackbotsspam
Aug  8 21:34:50 plusreed sshd[7027]: Invalid user server from 62.4.13.108
...
2019-08-09 09:35:02
36.67.106.109 attackbots
Aug  8 23:50:10 mail sshd\[19779\]: Invalid user ralf from 36.67.106.109
Aug  8 23:50:10 mail sshd\[19779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.106.109
Aug  8 23:50:12 mail sshd\[19779\]: Failed password for invalid user ralf from 36.67.106.109 port 42776 ssh2
...
2019-08-09 09:40:18
188.166.28.110 attack
Aug  8 23:51:00 pornomens sshd\[5213\]: Invalid user redmine from 188.166.28.110 port 42618
Aug  8 23:51:00 pornomens sshd\[5213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.28.110
Aug  8 23:51:02 pornomens sshd\[5213\]: Failed password for invalid user redmine from 188.166.28.110 port 42618 ssh2
...
2019-08-09 09:03:33
106.75.64.239 attackbotsspam
Aug  8 23:24:44 mail sshd\[12353\]: Failed password for invalid user ubuntu from 106.75.64.239 port 56546 ssh2
Aug  8 23:41:58 mail sshd\[12620\]: Invalid user miura from 106.75.64.239 port 35362
...
2019-08-09 09:37:53
177.73.193.216 attackbots
SASL Brute Force
2019-08-09 09:45:01

Recently Reported IPs

169.5.8.33 99.253.205.230 180.113.101.228 89.191.174.64
247.210.142.113 23.12.180.52 118.92.209.111 45.69.0.183
71.21.8.87 155.117.214.188 163.124.240.118 231.21.202.215
206.22.160.136 244.78.190.109 188.69.223.168 44.44.219.165
249.71.194.109 171.129.135.226 81.176.87.205 51.105.145.227