Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rosemount

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 35.148.66.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;35.148.66.99.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 10:40:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
99.66.148.35.in-addr.arpa domain name pointer syn-035-148-066-099.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.66.148.35.in-addr.arpa	name = syn-035-148-066-099.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.100.62.50 attackbotsspam
23/tcp
[2019-11-07]1pkt
2019-11-07 20:10:02
52.62.211.238 attackspambots
Unauthorised access (Nov  7) SRC=52.62.211.238 LEN=40 TTL=237 ID=45719 TCP DPT=445 WINDOW=1024 SYN
2019-11-07 20:24:58
180.183.231.21 attack
Chat Spam
2019-11-07 20:21:58
124.102.16.248 attack
DATE:2019-11-07 07:21:59, IP:124.102.16.248, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-11-07 20:23:30
218.92.0.192 attackspambots
Nov  7 13:16:00 legacy sshd[7161]: Failed password for root from 218.92.0.192 port 42979 ssh2
Nov  7 13:16:01 legacy sshd[7161]: Failed password for root from 218.92.0.192 port 42979 ssh2
Nov  7 13:16:04 legacy sshd[7161]: Failed password for root from 218.92.0.192 port 42979 ssh2
...
2019-11-07 20:31:58
49.88.112.60 attackspam
Nov  7 10:55:07 *** sshd[21685]: User root from 49.88.112.60 not allowed because not listed in AllowUsers
2019-11-07 20:10:52
179.83.247.250 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/179.83.247.250/ 
 
 BR - 1H : (291)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN10429 
 
 IP : 179.83.247.250 
 
 CIDR : 179.83.224.0/19 
 
 PREFIX COUNT : 145 
 
 UNIQUE IP COUNT : 1862400 
 
 
 ATTACKS DETECTED ASN10429 :  
  1H - 3 
  3H - 4 
  6H - 4 
 12H - 5 
 24H - 5 
 
 DateTime : 2019-11-07 07:21:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 20:30:47
187.191.113.54 attackbotsspam
Wordpress Admin Login attack
2019-11-07 20:22:50
91.121.211.59 attack
Nov  7 14:54:33 hosting sshd[14674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns364518.ip-91-121-211.eu  user=root
Nov  7 14:54:35 hosting sshd[14674]: Failed password for root from 91.121.211.59 port 38570 ssh2
...
2019-11-07 20:06:14
185.165.28.163 attack
11/07/2019-02:32:08.060700 185.165.28.163 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-07 20:03:40
106.13.29.223 attackspambots
Nov  7 11:27:55 game-panel sshd[12880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.223
Nov  7 11:27:57 game-panel sshd[12880]: Failed password for invalid user rohit from 106.13.29.223 port 45803 ssh2
Nov  7 11:33:40 game-panel sshd[13078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.223
2019-11-07 20:07:19
144.217.165.147 attackbotsspam
RDP Bruteforce
2019-11-07 20:27:57
178.128.28.36 attackbotsspam
178.128.28.36 - - \[07/Nov/2019:11:17:56 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.128.28.36 - - \[07/Nov/2019:11:17:57 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-07 20:36:06
140.246.32.143 attackspam
Nov  7 11:42:04 vps647732 sshd[27788]: Failed password for root from 140.246.32.143 port 49274 ssh2
...
2019-11-07 20:17:11
148.235.57.184 attackbots
Nov  7 12:46:35 sd-53420 sshd\[25012\]: User root from 148.235.57.184 not allowed because none of user's groups are listed in AllowGroups
Nov  7 12:46:35 sd-53420 sshd\[25012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.184  user=root
Nov  7 12:46:37 sd-53420 sshd\[25012\]: Failed password for invalid user root from 148.235.57.184 port 44030 ssh2
Nov  7 12:51:33 sd-53420 sshd\[26331\]: Invalid user ew from 148.235.57.184
Nov  7 12:51:33 sd-53420 sshd\[26331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.235.57.184
...
2019-11-07 20:05:39

Recently Reported IPs

196.36.254.134 90.187.233.23 219.175.88.44 231.61.179.116
174.244.252.50 227.148.35.218 123.47.99.56 45.143.112.54
36.90.41.238 63.140.153.72 16.100.246.220 31.216.254.135
148.41.23.38 22.140.54.184 19.221.209.22 16.40.99.204
93.38.244.85 96.162.140.166 143.40.50.3 242.178.78.27