Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.66.243.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11803
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.66.243.198.			IN	A

;; AUTHORITY SECTION:
.			3410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042302 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 24 01:24:34 +08 2019
;; MSG SIZE  rcvd: 117

Host info
198.243.66.12.in-addr.arpa domain name pointer slip-12-66-243-198.mis.prserv.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
198.243.66.12.in-addr.arpa	name = slip-12-66-243-198.mis.prserv.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
118.24.8.84 attack
Sep 23 12:07:51 saschabauer sshd[1215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.8.84
Sep 23 12:07:53 saschabauer sshd[1215]: Failed password for invalid user test from 118.24.8.84 port 34634 ssh2
2019-09-23 18:11:13
106.13.205.251 attack
Sep 23 03:58:03 ny01 sshd[9779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.205.251
Sep 23 03:58:05 ny01 sshd[9779]: Failed password for invalid user carlos from 106.13.205.251 port 54886 ssh2
Sep 23 04:03:28 ny01 sshd[10873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.205.251
2019-09-23 18:54:50
200.209.174.92 attack
Sep 23 12:42:26 rpi sshd[12200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.209.174.92 
Sep 23 12:42:27 rpi sshd[12200]: Failed password for invalid user larissa from 200.209.174.92 port 60731 ssh2
2019-09-23 19:10:43
60.250.191.6 attackspambots
Honeypot attack, port: 23, PTR: 60-250-191-6.HINET-IP.hinet.net.
2019-09-23 19:20:03
36.91.24.27 attackbots
Sep 23 09:19:09 hcbbdb sshd\[3624\]: Invalid user baby from 36.91.24.27
Sep 23 09:19:09 hcbbdb sshd\[3624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
Sep 23 09:19:11 hcbbdb sshd\[3624\]: Failed password for invalid user baby from 36.91.24.27 port 48466 ssh2
Sep 23 09:25:01 hcbbdb sshd\[4266\]: Invalid user asdfgh from 36.91.24.27
Sep 23 09:25:01 hcbbdb sshd\[4266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
2019-09-23 17:41:48
218.92.0.143 attack
Sep 23 11:33:46 mail sshd\[26504\]: Failed password for root from 218.92.0.143 port 18242 ssh2
Sep 23 11:33:48 mail sshd\[26504\]: Failed password for root from 218.92.0.143 port 18242 ssh2
Sep 23 11:33:52 mail sshd\[26504\]: Failed password for root from 218.92.0.143 port 18242 ssh2
Sep 23 11:33:55 mail sshd\[26504\]: Failed password for root from 218.92.0.143 port 18242 ssh2
Sep 23 11:33:57 mail sshd\[26504\]: Failed password for root from 218.92.0.143 port 18242 ssh2
Sep 23 11:33:57 mail sshd\[26504\]: error: maximum authentication attempts exceeded for root from 218.92.0.143 port 18242 ssh2 \[preauth\]
2019-09-23 17:48:31
114.67.97.46 attack
Sep 22 19:28:43 web9 sshd\[3829\]: Invalid user test from 114.67.97.46
Sep 22 19:28:43 web9 sshd\[3829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.97.46
Sep 22 19:28:44 web9 sshd\[3829\]: Failed password for invalid user test from 114.67.97.46 port 54483 ssh2
Sep 22 19:33:18 web9 sshd\[4714\]: Invalid user maxiaoli from 114.67.97.46
Sep 22 19:33:18 web9 sshd\[4714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.97.46
2019-09-23 19:06:56
67.205.177.0 attack
Sep 23 07:07:36 www sshd\[54789\]: Invalid user strong from 67.205.177.0
Sep 23 07:07:36 www sshd\[54789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.177.0
Sep 23 07:07:38 www sshd\[54789\]: Failed password for invalid user strong from 67.205.177.0 port 44558 ssh2
...
2019-09-23 17:38:40
81.22.45.95 attackspambots
09/23/2019-00:20:17.158356 81.22.45.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 86
2019-09-23 18:31:58
134.209.203.238 attackspam
xmlrpc attack
2019-09-23 19:12:52
51.75.170.13 attack
Sep 23 12:03:49 SilenceServices sshd[15810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13
Sep 23 12:03:51 SilenceServices sshd[15810]: Failed password for invalid user welcome from 51.75.170.13 port 47936 ssh2
Sep 23 12:07:46 SilenceServices sshd[16907]: Failed password for root from 51.75.170.13 port 33198 ssh2
2019-09-23 18:17:33
41.137.137.92 attackspambots
Sep 23 12:18:39 core sshd[24719]: Invalid user garuistha from 41.137.137.92 port 32798
Sep 23 12:18:41 core sshd[24719]: Failed password for invalid user garuistha from 41.137.137.92 port 32798 ssh2
...
2019-09-23 18:32:56
59.35.93.142 attackspambots
Automatic report - Port Scan Attack
2019-09-23 17:46:09
217.65.27.132 attack
ssh intrusion attempt
2019-09-23 19:19:23
132.232.104.35 attackbots
Sep 23 04:49:27 xtremcommunity sshd\[389022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.35  user=root
Sep 23 04:49:29 xtremcommunity sshd\[389022\]: Failed password for root from 132.232.104.35 port 36994 ssh2
Sep 23 04:55:03 xtremcommunity sshd\[389111\]: Invalid user postgres from 132.232.104.35 port 51880
Sep 23 04:55:03 xtremcommunity sshd\[389111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.104.35
Sep 23 04:55:05 xtremcommunity sshd\[389111\]: Failed password for invalid user postgres from 132.232.104.35 port 51880 ssh2
...
2019-09-23 19:15:49

Recently Reported IPs

106.255.17.86 92.212.165.181 183.189.233.36 119.82.195.202
120.55.112.34 181.254.249.63 66.234.0.240 35.217.139.29
212.103.131.159 109.166.84.47 210.230.121.62 47.24.115.26
120.181.210.3 181.141.228.190 66.229.18.45 62.82.189.126
55.22.177.10 197.227.156.111 14.84.182.69 94.187.196.211