Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.120.9.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.120.9.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:14:09 CST 2025
;; MSG SIZE  rcvd: 104
Host info
99.9.120.66.in-addr.arpa domain name pointer adsl-66-120-9-99.dsl.sntc01.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.9.120.66.in-addr.arpa	name = adsl-66-120-9-99.dsl.sntc01.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.53.237.108 attackbots
Sep 15 11:01:35 saschabauer sshd[12940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.53.237.108
Sep 15 11:01:36 saschabauer sshd[12940]: Failed password for invalid user admin from 177.53.237.108 port 58018 ssh2
2019-09-15 17:18:32
222.186.30.165 attackbotsspam
2019-09-15T17:39:46.512997enmeeting.mahidol.ac.th sshd\[29967\]: User root from 222.186.30.165 not allowed because not listed in AllowUsers
2019-09-15T17:39:46.926040enmeeting.mahidol.ac.th sshd\[29967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
2019-09-15T17:39:49.391118enmeeting.mahidol.ac.th sshd\[29967\]: Failed password for invalid user root from 222.186.30.165 port 57212 ssh2
...
2019-09-15 18:47:05
177.124.77.150 attackspam
Autoban   177.124.77.150 AUTH/CONNECT
2019-09-15 17:25:16
103.243.252.244 attack
Sep 15 07:14:53 eventyay sshd[17418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244
Sep 15 07:14:55 eventyay sshd[17418]: Failed password for invalid user otto from 103.243.252.244 port 35943 ssh2
Sep 15 07:20:06 eventyay sshd[17599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244
...
2019-09-15 17:34:57
220.134.146.84 attackspambots
Sep 15 05:24:28 plusreed sshd[14610]: Invalid user test from 220.134.146.84
...
2019-09-15 17:41:24
209.97.135.185 attack
Sep 15 11:45:10 [host] sshd[1981]: Invalid user user from 209.97.135.185
Sep 15 11:45:10 [host] sshd[1981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.135.185
Sep 15 11:45:12 [host] sshd[1981]: Failed password for invalid user user from 209.97.135.185 port 51322 ssh2
2019-09-15 18:01:31
171.113.137.67 attackspambots
UTC: 2019-09-14 port: 23/tcp
2019-09-15 17:54:56
54.36.54.24 attack
Sep 15 09:15:07 MK-Soft-VM5 sshd\[4512\]: Invalid user admin from 54.36.54.24 port 38248
Sep 15 09:15:07 MK-Soft-VM5 sshd\[4512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.54.24
Sep 15 09:15:08 MK-Soft-VM5 sshd\[4512\]: Failed password for invalid user admin from 54.36.54.24 port 38248 ssh2
...
2019-09-15 17:19:56
222.186.15.110 attackbots
2019-09-15T09:26:45.076853abusebot-8.cloudsearch.cf sshd\[22396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
2019-09-15 17:33:10
207.154.229.50 attackspambots
Sep 15 10:26:49 vmanager6029 sshd\[7517\]: Invalid user tk from 207.154.229.50 port 46526
Sep 15 10:26:49 vmanager6029 sshd\[7517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
Sep 15 10:26:51 vmanager6029 sshd\[7517\]: Failed password for invalid user tk from 207.154.229.50 port 46526 ssh2
2019-09-15 17:27:36
79.155.112.192 attack
SSH bruteforce (Triggered fail2ban)
2019-09-15 17:29:01
138.68.4.198 attackspam
Sep 15 10:02:36 vps647732 sshd[18006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198
Sep 15 10:02:38 vps647732 sshd[18006]: Failed password for invalid user sherlock from 138.68.4.198 port 52386 ssh2
...
2019-09-15 17:44:11
60.172.32.198 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-15 00:44:01,777 INFO [amun_request_handler] PortScan Detected on Port: 3389 (60.172.32.198)
2019-09-15 18:23:53
46.105.31.249 attack
Sep 14 16:46:41 hiderm sshd\[7915\]: Invalid user sw from 46.105.31.249
Sep 14 16:46:41 hiderm sshd\[7915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-46-105-31.eu
Sep 14 16:46:44 hiderm sshd\[7915\]: Failed password for invalid user sw from 46.105.31.249 port 48274 ssh2
Sep 14 16:50:23 hiderm sshd\[8188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=249.ip-46-105-31.eu  user=mysql
Sep 14 16:50:24 hiderm sshd\[8188\]: Failed password for mysql from 46.105.31.249 port 32778 ssh2
2019-09-15 18:13:56
157.230.144.158 attackbots
Sep 14 23:17:55 aiointranet sshd\[663\]: Invalid user ua from 157.230.144.158
Sep 14 23:17:55 aiointranet sshd\[663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158
Sep 14 23:17:56 aiointranet sshd\[663\]: Failed password for invalid user ua from 157.230.144.158 port 48588 ssh2
Sep 14 23:22:01 aiointranet sshd\[1256\]: Invalid user hart from 157.230.144.158
Sep 14 23:22:01 aiointranet sshd\[1256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158
2019-09-15 17:24:13

Recently Reported IPs

240.251.252.72 47.221.79.58 248.137.202.163 224.80.21.76
248.60.62.166 201.18.132.242 163.120.89.246 141.92.41.251
64.229.254.211 181.52.221.225 20.253.253.103 99.53.57.38
50.238.66.34 157.150.161.171 79.219.126.25 236.175.94.231
232.40.123.74 24.1.95.78 201.168.32.98 162.8.27.126