Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.104.22.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47147
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.104.22.8.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 01 23:48:53 CST 2019
;; MSG SIZE  rcvd: 115
Host info
8.22.104.66.in-addr.arpa domain name pointer ip66-104-22-8.z22-104-66.customer.algx.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
8.22.104.66.in-addr.arpa	name = ip66-104-22-8.z22-104-66.customer.algx.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.160.208.242 attackspambots
Unauthorized connection attempt from IP address 113.160.208.242 on Port 445(SMB)
2019-07-08 03:29:37
114.142.171.48 attackbots
Unauthorized connection attempt from IP address 114.142.171.48 on Port 445(SMB)
2019-07-08 03:29:59
104.227.2.140 attack
[portscan] Port scan
2019-07-08 03:23:45
82.212.85.106 attack
Unauthorized connection attempt from IP address 82.212.85.106 on Port 445(SMB)
2019-07-08 03:27:04
130.255.130.147 attack
Fail2Ban Ban Triggered
2019-07-08 03:13:30
139.28.218.130 attackspambots
Postfix DNSBL listed. Trying to send SPAM.
2019-07-08 02:56:39
51.68.70.72 attack
Jul  7 12:37:42 aat-srv002 sshd[12668]: Failed password for root from 51.68.70.72 port 52960 ssh2
Jul  7 12:40:35 aat-srv002 sshd[12720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.72
Jul  7 12:40:36 aat-srv002 sshd[12720]: Failed password for invalid user accounts from 51.68.70.72 port 53870 ssh2
...
2019-07-08 02:58:54
187.120.142.126 attack
SMTP-sasl brute force
...
2019-07-08 02:56:08
95.58.194.148 attackspambots
2019-07-07T19:29:06.431642stark.klein-stark.info sshd\[3423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.148  user=vmail
2019-07-07T19:29:08.490675stark.klein-stark.info sshd\[3423\]: Failed password for vmail from 95.58.194.148 port 54480 ssh2
2019-07-07T19:32:01.440019stark.klein-stark.info sshd\[3617\]: Invalid user max from 95.58.194.148 port 55072
2019-07-07T19:32:01.446641stark.klein-stark.info sshd\[3617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.148
...
2019-07-08 03:13:58
73.104.171.29 attackbots
3389BruteforceFW22
2019-07-08 02:57:26
200.6.188.38 attack
Jul  7 19:09:39 ns37 sshd[7944]: Failed password for mysql from 200.6.188.38 port 39238 ssh2
Jul  7 19:11:29 ns37 sshd[8072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.188.38
Jul  7 19:11:31 ns37 sshd[8072]: Failed password for invalid user rust from 200.6.188.38 port 59434 ssh2
2019-07-08 02:57:48
198.20.175.131 attackspambots
[portscan] Port scan
2019-07-08 03:02:48
194.37.92.48 attackspambots
Jul  7 15:11:04 marvibiene sshd[14692]: Invalid user test from 194.37.92.48 port 42257
Jul  7 15:11:04 marvibiene sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.37.92.48
Jul  7 15:11:04 marvibiene sshd[14692]: Invalid user test from 194.37.92.48 port 42257
Jul  7 15:11:07 marvibiene sshd[14692]: Failed password for invalid user test from 194.37.92.48 port 42257 ssh2
...
2019-07-08 02:51:34
171.236.105.148 attackspam
Unauthorized connection attempt from IP address 171.236.105.148 on Port 445(SMB)
2019-07-08 03:29:08
128.199.216.13 attackspambots
SSH Bruteforce
2019-07-08 02:56:58

Recently Reported IPs

103.81.63.18 117.60.137.51 199.88.141.197 168.228.150.68
72.254.213.64 206.33.168.230 191.90.7.41 69.44.177.34
142.39.138.158 123.232.124.106 37.96.59.156 185.228.229.217
165.244.197.47 220.174.20.120 41.8.48.91 34.71.50.4
168.232.131.80 178.132.220.199 62.236.246.40 197.231.203.33