Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Grove City

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: CONTINENTAL BROADBAND PENNSYLVANIA, INC.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.11.28.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56076
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.11.28.52.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 25 20:35:39 CST 2019
;; MSG SIZE  rcvd: 115

Host info
52.28.11.66.in-addr.arpa domain name pointer 66-11-28-52.orf.contbb.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
52.28.11.66.in-addr.arpa	name = 66-11-28-52.orf.contbb.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
105.71.24.9 attack
Sep 28 22:36:21 mellenthin postfix/smtpd[7480]: NOQUEUE: reject: RCPT from dynggrab-9-24-71-105.inwitelecom.net[105.71.24.9]: 554 5.7.1 Service unavailable; Client host [105.71.24.9] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/105.71.24.9; from= to= proto=ESMTP helo=
2020-09-30 00:09:02
46.105.31.249 attackbotsspam
2020-09-29 07:21:41.815252-0500  localhost sshd[82100]: Failed password for root from 46.105.31.249 port 38020 ssh2
2020-09-30 00:05:19
106.12.211.254 attackbotsspam
Sep 29 16:27:57 rancher-0 sshd[373537]: Invalid user samba1 from 106.12.211.254 port 53186
Sep 29 16:27:59 rancher-0 sshd[373537]: Failed password for invalid user samba1 from 106.12.211.254 port 53186 ssh2
...
2020-09-30 00:34:25
218.103.131.32 attackbots
TCP Port Scanning
2020-09-30 00:27:48
5.188.62.147 attack
5.188.62.147 - - \[29/Sep/2020:16:20:31 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 6.2\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2224.3 Safari/537.36"
5.188.62.147 - - \[29/Sep/2020:16:20:32 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2226.0 Safari/537.36"
5.188.62.147 - - \[29/Sep/2020:16:20:33 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 760 "-" "Mozilla/5.0 \(Windows NT 5.1\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/41.0.2228.0 Safari/537.36"
2020-09-30 00:13:45
200.169.6.206 attackspam
vps:sshd-InvalidUser
2020-09-30 00:31:58
81.68.126.101 attackspambots
Invalid user mapred from 81.68.126.101 port 54586
2020-09-30 00:31:03
36.156.155.192 attack
Sep 29 14:36:10 mout sshd[32678]: Invalid user thomas from 36.156.155.192 port 56553
Sep 29 14:36:12 mout sshd[32678]: Failed password for invalid user thomas from 36.156.155.192 port 56553 ssh2
Sep 29 14:36:13 mout sshd[32678]: Disconnected from invalid user thomas 36.156.155.192 port 56553 [preauth]
2020-09-30 00:16:33
27.223.99.130 attackspam
Invalid user test001 from 27.223.99.130 port 45398
2020-09-30 00:26:56
132.232.10.144 attackbots
Invalid user fedora from 132.232.10.144 port 60178
2020-09-30 00:28:40
61.187.92.45 attackbotsspam
Automatic report - Port Scan Attack
2020-09-30 00:38:20
206.189.132.8 attackbotsspam
Invalid user oracle2 from 206.189.132.8 port 33202
2020-09-30 00:22:08
141.98.10.143 attackbotsspam
2020-09-29T10:10:37.256670linuxbox-skyline auth[217442]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=1q2w3e4r rhost=141.98.10.143
...
2020-09-30 00:16:18
104.41.45.235 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-09-30 00:04:43
221.121.152.221 attack
Invalid user marcel from 221.121.152.221 port 37164
2020-09-30 00:36:29

Recently Reported IPs

78.186.188.192 58.16.116.44 175.228.20.37 96.47.228.109
57.15.177.15 200.64.32.246 218.93.192.238 95.6.93.147
90.69.79.206 104.248.11.238 199.107.67.117 123.125.195.190
119.180.74.137 82.86.101.0 64.93.164.92 164.82.214.173
2.186.96.125 67.235.182.59 170.130.75.131 104.238.206.127