Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.247.247.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.247.247.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 16:29:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 66.247.247.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.247.247.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.139.13.105 attackbotsspam
<6 unauthorized SSH connections
2019-08-26 15:45:37
104.199.174.199 attackspambots
Aug 26 04:24:54 plusreed sshd[10297]: Invalid user m1 from 104.199.174.199
...
2019-08-26 16:26:11
200.35.53.121 attackspambots
" "
2019-08-26 15:43:38
60.184.140.228 attackbots
Aug 26 05:24:52 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
Aug 26 05:24:55 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
Aug 26 05:24:58 vps691689 sshd[21827]: Failed password for root from 60.184.140.228 port 52011 ssh2
...
2019-08-26 16:26:44
115.150.208.2 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-25 17:40:55,047 INFO [shellcode_manager] (115.150.208.2) no match, writing hexdump (58e580462f1d47a488fd00035c6a6d9b :2383152) - MS17010 (EternalBlue)
2019-08-26 16:30:28
67.207.91.133 attack
$f2bV_matches
2019-08-26 16:22:13
51.254.57.17 attack
Aug 26 09:52:34 OPSO sshd\[22987\]: Invalid user daphne from 51.254.57.17 port 44154
Aug 26 09:52:34 OPSO sshd\[22987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
Aug 26 09:52:37 OPSO sshd\[22987\]: Failed password for invalid user daphne from 51.254.57.17 port 44154 ssh2
Aug 26 09:56:23 OPSO sshd\[23536\]: Invalid user git from 51.254.57.17 port 38852
Aug 26 09:56:23 OPSO sshd\[23536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.57.17
2019-08-26 15:59:19
167.99.159.60 attack
Aug 26 12:53:12 lcl-usvr-01 sshd[8250]: Invalid user rootkit from 167.99.159.60
Aug 26 12:53:12 lcl-usvr-01 sshd[8250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.159.60 
Aug 26 12:53:12 lcl-usvr-01 sshd[8250]: Invalid user rootkit from 167.99.159.60
Aug 26 12:53:14 lcl-usvr-01 sshd[8250]: Failed password for invalid user rootkit from 167.99.159.60 port 36776 ssh2
Aug 26 12:56:58 lcl-usvr-01 sshd[9313]: Invalid user donna from 167.99.159.60
2019-08-26 16:10:44
157.230.116.99 attackspam
Aug 26 05:35:44 Ubuntu-1404-trusty-64-minimal sshd\[14949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99  user=root
Aug 26 05:35:46 Ubuntu-1404-trusty-64-minimal sshd\[14949\]: Failed password for root from 157.230.116.99 port 40700 ssh2
Aug 26 05:52:10 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: Invalid user jking from 157.230.116.99
Aug 26 05:52:10 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.116.99
Aug 26 05:52:11 Ubuntu-1404-trusty-64-minimal sshd\[28948\]: Failed password for invalid user jking from 157.230.116.99 port 48566 ssh2
2019-08-26 15:52:32
159.89.134.64 attackspam
Aug 26 03:11:15 raspberrypi sshd\[15997\]: Invalid user joefmchat from 159.89.134.64Aug 26 03:11:17 raspberrypi sshd\[15997\]: Failed password for invalid user joefmchat from 159.89.134.64 port 40420 ssh2Aug 26 03:25:04 raspberrypi sshd\[16513\]: Invalid user fabian from 159.89.134.64
...
2019-08-26 16:16:18
81.30.212.14 attackspam
Aug 25 21:53:39 kapalua sshd\[1833\]: Invalid user postgres from 81.30.212.14
Aug 25 21:53:39 kapalua sshd\[1833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14.static.ufanet.ru
Aug 25 21:53:41 kapalua sshd\[1833\]: Failed password for invalid user postgres from 81.30.212.14 port 41634 ssh2
Aug 25 21:57:24 kapalua sshd\[2181\]: Invalid user club from 81.30.212.14
Aug 25 21:57:24 kapalua sshd\[2181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.212.14.static.ufanet.ru
2019-08-26 16:05:17
80.78.194.242 attack
Aug 26 01:50:47 nxxxxxxx0 sshd[3741]: Did not receive identification string from 80.78.194.242
Aug 26 01:51:05 nxxxxxxx0 sshd[3793]: Did not receive identification string from 80.78.194.242
Aug 26 01:51:16 nxxxxxxx0 sshd[3794]: Invalid user trash from 80.78.194.242
Aug 26 01:51:16 nxxxxxxx0 sshd[3794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.78.194.242 
Aug 26 01:51:18 nxxxxxxx0 sshd[3794]: Failed password for invalid user trash from 80.78.194.242 port 54866 ssh2
Aug 26 01:51:18 nxxxxxxx0 sshd[3794]: Received disconnect from 80.78.194.242: 11: Normal Shutdown, Thank you for playing [preauth]
Aug 26 01:51:21 nxxxxxxx0 sshd[3796]: Invalid user redmine from 80.78.194.242
Aug 26 01:51:21 nxxxxxxx0 sshd[3796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.78.194.242 
Aug 26 01:51:23 nxxxxxxx0 sshd[3796]: Failed password for invalid user redmine from 80.78.194.242 port 55768 ssh2
A........
-------------------------------
2019-08-26 15:39:43
217.197.255.242 attackspambots
[portscan] Port scan
2019-08-26 15:52:00
178.128.87.245 attack
$f2bV_matches
2019-08-26 15:58:31
37.49.224.137 attackspam
08/26/2019-03:48:53.230059 37.49.224.137 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 22
2019-08-26 15:57:22

Recently Reported IPs

252.148.3.125 65.208.255.198 137.69.24.4 81.75.187.25
70.33.86.115 93.50.117.67 255.165.177.99 178.223.236.160
36.226.246.149 195.56.32.160 134.243.242.8 210.14.50.82
74.148.187.42 58.156.30.17 228.178.231.7 240.73.42.151
253.146.168.93 47.184.148.39 198.215.146.45 137.246.78.9