Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Duluth

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.195.30.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19585
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.195.30.55.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120601 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 04:24:31 CST 2019
;; MSG SIZE  rcvd: 116
Host info
55.30.195.66.in-addr.arpa domain name pointer 66-195-30-55.static.ctl.one.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.30.195.66.in-addr.arpa	name = 66-195-30-55.static.ctl.one.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.252.40.193 attackbotsspam
Jun 13 09:09:05 abendstille sshd\[10673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.252.40.193  user=root
Jun 13 09:09:07 abendstille sshd\[10673\]: Failed password for root from 205.252.40.193 port 37681 ssh2
Jun 13 09:10:35 abendstille sshd\[12247\]: Invalid user mediatomb from 205.252.40.193
Jun 13 09:10:35 abendstille sshd\[12247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.252.40.193
Jun 13 09:10:37 abendstille sshd\[12247\]: Failed password for invalid user mediatomb from 205.252.40.193 port 48133 ssh2
...
2020-06-13 15:17:12
95.85.9.94 attackbots
Jun 13 08:01:53 cdc sshd[17113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.9.94 
Jun 13 08:01:55 cdc sshd[17113]: Failed password for invalid user pgadmin from 95.85.9.94 port 47335 ssh2
2020-06-13 15:09:50
5.188.62.15 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-13T04:00:06Z and 2020-06-13T04:09:10Z
2020-06-13 15:02:08
59.10.55.247 attackspambots
Brute-force attempt banned
2020-06-13 15:00:39
49.233.200.37 attackspam
Invalid user admin from 49.233.200.37 port 44254
2020-06-13 15:38:41
134.175.110.104 attackbotsspam
Jun 13 09:04:13 piServer sshd[20191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.110.104 
Jun 13 09:04:15 piServer sshd[20191]: Failed password for invalid user study from 134.175.110.104 port 33054 ssh2
Jun 13 09:08:41 piServer sshd[20600]: Failed password for root from 134.175.110.104 port 35906 ssh2
...
2020-06-13 15:17:27
45.119.82.251 attackbotsspam
Invalid user af from 45.119.82.251 port 46242
2020-06-13 15:15:18
36.238.80.62 attackspam
Brute-force attempt banned
2020-06-13 15:34:28
49.88.112.77 attack
Jun 13 04:09:31 dns1 sshd[18034]: Failed password for root from 49.88.112.77 port 55361 ssh2
Jun 13 04:09:35 dns1 sshd[18034]: Failed password for root from 49.88.112.77 port 55361 ssh2
Jun 13 04:09:39 dns1 sshd[18034]: Failed password for root from 49.88.112.77 port 55361 ssh2
2020-06-13 15:16:10
176.57.75.165 attackspam
Jun 13 09:17:51 piServer sshd[21440]: Failed password for root from 176.57.75.165 port 35316 ssh2
Jun 13 09:21:22 piServer sshd[21785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.57.75.165 
Jun 13 09:21:24 piServer sshd[21785]: Failed password for invalid user sababo from 176.57.75.165 port 34604 ssh2
...
2020-06-13 15:29:43
178.239.157.236 attack
Port probing on unauthorized port 445
2020-06-13 15:05:32
89.248.162.247 attackbotsspam
06/13/2020-00:13:34.335015 89.248.162.247 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-13 15:34:02
128.199.32.61 attack
Jun 13 09:14:35 andromeda sshd\[23424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.32.61  user=root
Jun 13 09:14:37 andromeda sshd\[23424\]: Failed password for root from 128.199.32.61 port 35140 ssh2
Jun 13 09:15:19 andromeda sshd\[23596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.32.61  user=root
2020-06-13 15:27:42
121.162.60.159 attack
Tried sshing with brute force.
2020-06-13 15:04:09
222.186.175.163 attackspambots
Jun 13 09:28:22 sso sshd[12757]: Failed password for root from 222.186.175.163 port 10250 ssh2
Jun 13 09:28:25 sso sshd[12757]: Failed password for root from 222.186.175.163 port 10250 ssh2
...
2020-06-13 15:32:42

Recently Reported IPs

205.243.160.133 91.165.153.59 119.129.146.82 52.83.187.123
216.171.246.10 220.185.89.105 78.40.87.14 119.187.56.64
123.121.192.161 90.8.156.174 24.133.253.73 166.1.44.203
134.249.127.233 31.168.71.48 191.129.226.120 12.63.114.59
1.52.173.204 40.72.83.167 170.0.45.194 41.208.203.242