Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.22.99.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37489
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.22.99.2.			IN	A

;; AUTHORITY SECTION:
.			410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112400 1800 900 604800 86400

;; Query time: 132 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 24 17:33:21 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.99.22.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.99.22.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.217.218.93 attack
Invalid user testftp1 from 139.217.218.93 port 54498
2020-10-12 05:18:19
13.81.50.85 attack
Oct 11 17:20:57 con01 sshd[3693644]: Invalid user teamspeak3 from 13.81.50.85 port 60058
Oct 11 17:20:57 con01 sshd[3693644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.81.50.85 
Oct 11 17:20:57 con01 sshd[3693644]: Invalid user teamspeak3 from 13.81.50.85 port 60058
Oct 11 17:20:59 con01 sshd[3693644]: Failed password for invalid user teamspeak3 from 13.81.50.85 port 60058 ssh2
Oct 11 17:22:12 con01 sshd[3695829]: Invalid user tftpboot from 13.81.50.85 port 36984
...
2020-10-12 05:33:12
195.54.160.180 attackspambots
Oct 11 23:32:20 vmd26974 sshd[30264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180
Oct 11 23:32:23 vmd26974 sshd[30264]: Failed password for invalid user system from 195.54.160.180 port 14159 ssh2
...
2020-10-12 05:35:19
86.26.33.173 attackbotsspam
Invalid user user1 from 86.26.33.173 port 1866
2020-10-12 05:45:08
141.101.69.211 attackspambots
srv02 DDoS Malware Target(80:http) ..
2020-10-12 05:42:13
154.127.32.116 attack
Oct 11 22:07:25 mail sshd[13628]: Failed password for root from 154.127.32.116 port 35576 ssh2
2020-10-12 05:44:19
116.12.52.141 attackspambots
2020-10-11T03:38:46.359711hostname sshd[15523]: Failed password for root from 116.12.52.141 port 48152 ssh2
...
2020-10-12 05:40:19
5.8.10.202 attackbotsspam
firewall-block, port(s): 27960/udp
2020-10-12 05:37:37
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
218.92.0.168 attack
Brute-force attempt banned
2020-10-12 05:17:24
69.119.85.43 attack
frenzy
2020-10-12 05:25:27
159.89.9.22 attackspam
Oct 11 12:15:30 ns308116 sshd[30875]: Invalid user birmingham from 159.89.9.22 port 58244
Oct 11 12:15:30 ns308116 sshd[30875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.9.22
Oct 11 12:15:32 ns308116 sshd[30875]: Failed password for invalid user birmingham from 159.89.9.22 port 58244 ssh2
Oct 11 12:24:47 ns308116 sshd[980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.9.22  user=root
Oct 11 12:24:49 ns308116 sshd[980]: Failed password for root from 159.89.9.22 port 39588 ssh2
...
2020-10-12 05:20:34
49.232.133.186 attackspam
Oct 11 23:12:54 Server sshd[617431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.133.186 
Oct 11 23:12:54 Server sshd[617431]: Invalid user info from 49.232.133.186 port 40740
Oct 11 23:12:55 Server sshd[617431]: Failed password for invalid user info from 49.232.133.186 port 40740 ssh2
Oct 11 23:17:46 Server sshd[617898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.133.186  user=root
Oct 11 23:17:48 Server sshd[617898]: Failed password for root from 49.232.133.186 port 40908 ssh2
...
2020-10-12 05:23:24
222.186.42.57 attackspambots
Oct 11 23:32:33 OPSO sshd\[27389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
Oct 11 23:32:35 OPSO sshd\[27389\]: Failed password for root from 222.186.42.57 port 42651 ssh2
Oct 11 23:32:38 OPSO sshd\[27389\]: Failed password for root from 222.186.42.57 port 42651 ssh2
Oct 11 23:32:40 OPSO sshd\[27389\]: Failed password for root from 222.186.42.57 port 42651 ssh2
Oct 11 23:32:42 OPSO sshd\[27391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.57  user=root
2020-10-12 05:36:25
116.255.216.34 attackspambots
Oct 11 21:42:36 Ubuntu-1404-trusty-64-minimal sshd\[20446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.216.34  user=root
Oct 11 21:42:38 Ubuntu-1404-trusty-64-minimal sshd\[20446\]: Failed password for root from 116.255.216.34 port 39572 ssh2
Oct 11 21:51:59 Ubuntu-1404-trusty-64-minimal sshd\[25289\]: Invalid user anthony from 116.255.216.34
Oct 11 21:51:59 Ubuntu-1404-trusty-64-minimal sshd\[25289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.216.34
Oct 11 21:52:01 Ubuntu-1404-trusty-64-minimal sshd\[25289\]: Failed password for invalid user anthony from 116.255.216.34 port 58424 ssh2
2020-10-12 05:22:52

Recently Reported IPs

204.48.18.134 138.197.131.214 187.192.1.221 35.55.47.114
209.24.152.96 92.80.186.32 248.161.21.102 231.25.239.96
215.125.233.120 36.134.36.99 89.248.165.124 186.48.15.66
101.134.187.120 104.237.198.3 60.2.91.147 17.24.167.241
103.109.56.119 153.75.130.55 199.26.100.112 185.121.74.196