Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Internap Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
ICMP MP Probe, Scan -
2019-08-10 21:01:18
Comments on same subnet:
IP Type Details Datetime
66.150.8.90 attack
Bad IP
2024-05-21 12:35:02
66.150.8.90 spamattackproxy
Botnet DB Scanner
2024-05-17 12:49:03
66.150.8.90 attackproxy
Brute-force attacker IP
2024-05-10 14:50:18
66.150.8.90 attackproxy
Vulnerability Scanner
2024-04-19 23:59:04
66.150.8.90 attack
Malicious IP/ DOS Possible
2024-04-18 23:52:22
66.150.8.90 attack
NTP DDoS
2024-03-26 13:44:15
66.150.8.90 attackspambots
TCP Port Scanning
2020-10-14 09:25:35
66.150.8.88 attackbots
TCP Port Scanning
2020-10-14 09:13:58
66.150.8.87 attackbots
TCP Port Scanning
2020-10-14 09:06:54
66.150.8.0 attack
ICMP MP Probe, Scan -
2019-08-10 21:04:45
66.150.8.79 attackspambots
ICMP MP Probe, Scan -
2019-08-10 21:02:54
66.150.8.85 attackbotsspam
ICMP MP Probe, Scan -
2019-08-10 20:59:01
66.150.8.87 attack
ICMP MP Probe, Scan -
2019-08-10 20:54:38
66.150.8.88 attackspambots
ICMP MP Probe, Scan -
2019-08-10 20:53:02
66.150.8.90 attack
ICMP MP Probe, Scan -
2019-08-10 20:49:47
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.150.8.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24214
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.150.8.83.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081000 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 10 21:01:08 CST 2019
;; MSG SIZE  rcvd: 115
Host info
83.8.150.66.in-addr.arpa domain name pointer performance-measurement-7018-1.sef.pnap.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
83.8.150.66.in-addr.arpa	name = performance-measurement-7018-1.sef.pnap.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.157.147 attackbotsspam
Oct 24 18:04:43 areeb-Workstation sshd[16855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.157.147
Oct 24 18:04:45 areeb-Workstation sshd[16855]: Failed password for invalid user support from 45.55.157.147 port 60111 ssh2
...
2019-10-24 21:35:07
94.40.74.200 attackspam
2018-12-02 14:05:10 1gTRQs-00044h-9w SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:26794 I=\[193.107.88.166\]:25 closed by DROP in ACL
2018-12-02 14:05:54 1gTRRZ-00045x-P3 SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:27124 I=\[193.107.88.166\]:25 closed by DROP in ACL
2018-12-02 14:06:12 1gTRRs-00046K-Cq SMTP connection from 94-40-74-200.tktelekom.pl \[94.40.74.200\]:27298 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2019-10-24 21:03:53
5.39.163.224 attack
Invalid user ubnt from 5.39.163.224 port 51644
2019-10-24 21:38:08
202.137.155.190 attackspam
Invalid user admin from 202.137.155.190 port 43757
2019-10-24 21:39:48
202.29.220.186 attackbots
Oct 24 14:12:07 lnxweb62 sshd[2549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.186
Oct 24 14:12:07 lnxweb62 sshd[2550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.220.186
Oct 24 14:12:09 lnxweb62 sshd[2549]: Failed password for invalid user pi from 202.29.220.186 port 59140 ssh2
2019-10-24 21:40:09
118.34.12.35 attack
Invalid user admin from 118.34.12.35 port 44218
2019-10-24 21:25:28
162.243.158.185 attackbotsspam
Invalid user kathleen from 162.243.158.185 port 33828
2019-10-24 21:17:15
188.166.237.191 attackbotsspam
Invalid user jboss from 188.166.237.191 port 60090
2019-10-24 21:42:17
106.13.48.157 attack
Invalid user wu from 106.13.48.157 port 53504
2019-10-24 21:28:48
132.232.104.106 attack
Invalid user reko from 132.232.104.106 port 50592
2019-10-24 21:22:24
212.145.231.149 attackbots
Oct 24 12:44:04 XXX sshd[31373]: Invalid user user from 212.145.231.149 port 38259
2019-10-24 21:09:10
189.232.100.142 attack
Invalid user admin from 189.232.100.142 port 43943
2019-10-24 21:41:50
201.22.59.94 attackspam
Oct 24 13:39:17 www_kotimaassa_fi sshd[16208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.59.94
Oct 24 13:39:18 www_kotimaassa_fi sshd[16208]: Failed password for invalid user cs from 201.22.59.94 port 58258 ssh2
...
2019-10-24 21:40:25
192.228.100.249 attack
Invalid user DUP from 192.228.100.249 port 47289
2019-10-24 21:11:07
159.89.194.103 attackspambots
Invalid user gitlab from 159.89.194.103 port 41634
2019-10-24 21:18:06

Recently Reported IPs

150.216.197.208 14.139.125.70 178.122.239.121 14.139.120.51
176.89.115.112 172.245.159.142 153.11.219.71 118.71.48.247
160.153.154.2 64.94.45.68 14.116.254.127 41.35.17.72
14.116.251.29 61.254.200.126 5.189.160.177 64.94.45.67
58.71.220.30 180.248.121.42 115.75.104.128 177.167.178.225