Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Milwaukee

Region: Wisconsin

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.250.80.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.250.80.66.			IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 28 07:30:05 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 66.80.250.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.80.250.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.128.224 attackspam
TCP port : 3389
2020-09-29 06:08:34
24.92.187.245 attackbotsspam
2020-09-28T15:07:03.283531hostname sshd[47665]: Failed password for invalid user lw from 24.92.187.245 port 41172 ssh2
...
2020-09-29 05:46:39
167.71.211.104 attackbots
2020-09-27 17:22:34 server sshd[16390]: Failed password for invalid user calvin from 167.71.211.104 port 59778 ssh2
2020-09-29 05:56:19
159.65.84.183 attack
Sep 28 23:49:50 host sshd[17822]: Invalid user kongxx from 159.65.84.183 port 46172
...
2020-09-29 06:19:19
106.75.132.3 attack
Sep 28 08:31:36 Tower sshd[1477]: refused connect from 119.28.59.16 (119.28.59.16)
Sep 28 17:51:17 Tower sshd[1477]: Connection from 106.75.132.3 port 59792 on 192.168.10.220 port 22 rdomain ""
Sep 28 17:51:19 Tower sshd[1477]: Failed password for root from 106.75.132.3 port 59792 ssh2
Sep 28 17:51:19 Tower sshd[1477]: Received disconnect from 106.75.132.3 port 59792:11: Bye Bye [preauth]
Sep 28 17:51:19 Tower sshd[1477]: Disconnected from authenticating user root 106.75.132.3 port 59792 [preauth]
2020-09-29 06:06:38
132.232.120.145 attackbotsspam
Sep 28 20:57:11 Invalid user ubuntu from 132.232.120.145 port 41730
2020-09-29 05:44:41
167.99.7.149 attack
Port Scan
...
2020-09-29 06:14:31
167.172.25.74 attackbotsspam
Sep 28 04:46:34 : SSH login attempts with invalid user
2020-09-29 06:09:17
115.72.141.103 attack
Port Scan detected!
...
2020-09-29 05:59:44
82.64.153.14 attack
2020-09-28T23:26:11.383750ks3355764 sshd[19885]: Invalid user redmine from 82.64.153.14 port 37916
2020-09-28T23:26:13.595500ks3355764 sshd[19885]: Failed password for invalid user redmine from 82.64.153.14 port 37916 ssh2
...
2020-09-29 06:12:16
222.186.175.148 attackspambots
Failed password for invalid user from 222.186.175.148 port 12334 ssh2
2020-09-29 06:18:47
106.52.205.211 attack
SSH Invalid Login
2020-09-29 05:48:50
104.41.33.227 attackspam
Invalid user monitor from 104.41.33.227 port 53366
2020-09-29 06:09:05
167.71.134.241 attackbotsspam
Sep 28 17:50:19 IngegnereFirenze sshd[26643]: Failed password for invalid user landspace from 167.71.134.241 port 37124 ssh2
...
2020-09-29 06:16:15
103.26.136.173 attack
2020-09-27T17:36:12.565848morrigan.ad5gb.com sshd[1555290]: Failed password for invalid user alex from 103.26.136.173 port 50752 ssh2
2020-09-29 06:04:39

Recently Reported IPs

52.178.111.40 142.105.11.219 118.149.191.187 201.27.196.110
191.174.250.19 175.0.249.105 159.246.28.249 179.243.147.175
100.239.181.19 14.113.132.111 81.173.222.111 213.133.153.252
126.46.69.64 175.19.253.188 210.10.143.8 174.108.157.133
96.225.43.40 135.19.132.112 178.64.130.132 178.205.16.184