Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.0.99.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6916
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;172.0.99.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:31:35 CST 2025
;; MSG SIZE  rcvd: 104
Host info
66.99.0.172.in-addr.arpa domain name pointer 172-0-99-66.lightspeed.stlsmo.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.99.0.172.in-addr.arpa	name = 172-0-99-66.lightspeed.stlsmo.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.91.193.116 attackspambots
Invalid user marlon from 51.91.193.116 port 50460
2019-10-25 02:21:35
220.92.16.90 attackbotsspam
2019-10-24T18:03:57.848245abusebot-5.cloudsearch.cf sshd\[23794\]: Invalid user bjorn from 220.92.16.90 port 59688
2019-10-25 02:30:18
138.97.94.1 attack
Invalid user admin from 138.97.94.1 port 51086
2019-10-25 01:59:29
212.237.22.95 attack
Invalid user murai from 212.237.22.95 port 33836
2019-10-25 02:31:36
218.88.164.159 attackspambots
Oct 24 19:35:50 bouncer sshd\[1781\]: Invalid user mhkim from 218.88.164.159 port 51671
Oct 24 19:35:50 bouncer sshd\[1781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.88.164.159 
Oct 24 19:35:52 bouncer sshd\[1781\]: Failed password for invalid user mhkim from 218.88.164.159 port 51671 ssh2
...
2019-10-25 02:30:31
128.199.133.249 attackbots
Invalid user zimbra from 128.199.133.249 port 51688
2019-10-25 02:00:25
45.114.244.56 attack
Invalid user www from 45.114.244.56 port 52501
2019-10-25 02:24:07
50.2.189.106 attack
Oct 24 19:51:41 server sshd\[24069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
Oct 24 19:51:43 server sshd\[24069\]: Failed password for root from 50.2.189.106 port 36400 ssh2
Oct 24 19:55:28 server sshd\[25099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
Oct 24 19:55:30 server sshd\[25099\]: Failed password for root from 50.2.189.106 port 42596 ssh2
Oct 24 20:13:49 server sshd\[29183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.2.189.106  user=root
...
2019-10-25 02:22:48
159.203.185.239 attack
Invalid user support from 159.203.185.239 port 53808
2019-10-25 01:54:58
119.42.175.200 attackbotsspam
Invalid user admin from 119.42.175.200 port 53757
2019-10-25 02:02:44
79.137.73.253 attackspambots
Invalid user administradorweb from 79.137.73.253 port 47278
2019-10-25 02:14:03
80.28.238.53 attackspambots
Invalid user user from 80.28.238.53 port 38986
2019-10-25 02:13:35
178.64.66.105 attackbots
Invalid user admin from 178.64.66.105 port 35049
2019-10-25 01:52:13
174.115.45.16 attackbotsspam
Invalid user max from 174.115.45.16 port 53804
2019-10-25 01:52:54
60.251.202.133 attackbotsspam
Invalid user finn from 60.251.202.133 port 54716
2019-10-25 02:18:44

Recently Reported IPs

24.192.176.200 3.12.61.132 77.168.80.247 116.34.9.72
29.101.70.139 250.227.0.96 50.227.224.237 31.233.6.77
101.148.57.113 65.123.47.84 193.98.26.60 144.219.82.228
245.79.52.94 116.136.40.88 139.165.47.84 167.59.77.140
232.37.9.232 90.215.191.248 252.139.50.204 90.58.13.5