Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Millersville

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.66.94.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.66.94.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:06:12 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 97.94.66.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.94.66.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.65.188.188 attackspam
Unauthorised access (Jul  8) SRC=40.65.188.188 LEN=40 TTL=234 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-07-09 03:18:37
94.204.254.153 attackspambots
23/tcp
[2019-07-08]1pkt
2019-07-09 03:32:36
51.158.185.24 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-09 04:04:38
51.38.99.1 attackbots
Honeypot hit.
2019-07-09 03:50:39
199.127.226.150 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-09 03:56:36
140.143.152.202 attack
Jul  8 21:05:40 dev sshd\[12946\]: Invalid user ivan from 140.143.152.202 port 48916
Jul  8 21:05:40 dev sshd\[12946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.152.202
...
2019-07-09 03:43:22
110.240.29.43 attack
Jul  8 20:48:35 ubuntu-2gb-fsn1-1 sshd[14992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.240.29.43
Jul  8 20:48:37 ubuntu-2gb-fsn1-1 sshd[14992]: Failed password for invalid user support from 110.240.29.43 port 34664 ssh2
...
2019-07-09 03:21:10
218.92.0.175 attack
Jul  8 20:47:43 icinga sshd[7296]: Failed password for root from 218.92.0.175 port 36424 ssh2
Jul  8 20:47:47 icinga sshd[7296]: Failed password for root from 218.92.0.175 port 36424 ssh2
Jul  8 20:47:51 icinga sshd[7296]: Failed password for root from 218.92.0.175 port 36424 ssh2
Jul  8 20:47:56 icinga sshd[7296]: Failed password for root from 218.92.0.175 port 36424 ssh2
...
2019-07-09 03:42:39
12.33.223.151 attack
ssh failed login
2019-07-09 03:36:32
68.160.224.34 attack
Jul  8 14:32:44 *** sshd[14338]: Invalid user register from 68.160.224.34 port 45118
Jul  8 14:32:46 *** sshd[14338]: Failed password for invalid user register from 68.160.224.34 port 45118 ssh2
Jul  8 14:32:46 *** sshd[14338]: Received disconnect from 68.160.224.34 port 45118:11: Bye Bye [preauth]
Jul  8 14:32:46 *** sshd[14338]: Disconnected from 68.160.224.34 port 45118 [preauth]
Jul  8 14:34:48 *** sshd[15972]: Invalid user akio from 68.160.224.34 port 57534
Jul  8 14:34:50 *** sshd[15972]: Failed password for invalid user akio from 68.160.224.34 port 57534 ssh2
Jul  8 14:34:50 *** sshd[15972]: Received disconnect from 68.160.224.34 port 57534:11: Bye Bye [preauth]
Jul  8 14:34:50 *** sshd[15972]: Disconnected from 68.160.224.34 port 57534 [preauth]
Jul  8 14:36:19 *** sshd[17726]: Invalid user test01 from 68.160.224.34 port 38172
Jul  8 14:36:21 *** sshd[17726]: Failed password for invalid user test01 from 68.160.224.34 port 38172 ssh2
Jul  8 14:36:21 *** sshd[1772........
-------------------------------
2019-07-09 03:27:22
191.23.85.198 attackspambots
Honeypot attack, port: 23, PTR: 191-23-85-198.user.vivozap.com.br.
2019-07-09 03:48:52
206.189.153.178 attackbotsspam
Invalid user dbmaker from 206.189.153.178 port 57456
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178
Failed password for invalid user dbmaker from 206.189.153.178 port 57456 ssh2
Invalid user archana from 206.189.153.178 port 33802
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.153.178
2019-07-09 04:04:54
118.168.72.108 attackbotsspam
37215/tcp 37215/tcp
[2019-07-08]2pkt
2019-07-09 03:59:59
159.65.75.4 attackbots
Jul  8 20:32:58 xxxxxxx0 sshd[9060]: Invalid user zm from 159.65.75.4 port 45902
Jul  8 20:32:58 xxxxxxx0 sshd[9060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.75.4
Jul  8 20:33:01 xxxxxxx0 sshd[9060]: Failed password for invalid user zm from 159.65.75.4 port 45902 ssh2
Jul  8 20:35:11 xxxxxxx0 sshd[9410]: Invalid user testuser from 159.65.75.4 port 42162
Jul  8 20:35:11 xxxxxxx0 sshd[9410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.75.4

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.75.4
2019-07-09 04:01:32
153.36.236.242 attackspam
2019-07-08T21:10:33.570234scmdmz1 sshd\[32082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.242  user=root
2019-07-08T21:10:35.482488scmdmz1 sshd\[32082\]: Failed password for root from 153.36.236.242 port 40441 ssh2
2019-07-08T21:10:37.563488scmdmz1 sshd\[32082\]: Failed password for root from 153.36.236.242 port 40441 ssh2
...
2019-07-09 03:22:31

Recently Reported IPs

27.4.166.211 35.125.148.225 118.7.163.211 236.225.178.107
55.72.205.4 216.118.81.158 198.59.57.171 45.240.215.236
181.56.125.226 216.229.213.24 249.159.190.208 5.173.250.120
250.123.136.232 92.34.208.183 85.177.236.214 217.15.215.189
54.110.135.12 136.132.46.161 209.60.81.87 184.88.200.76