Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.230.98.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.230.98.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:12:37 CST 2025
;; MSG SIZE  rcvd: 106
Host info
164.98.230.66.in-addr.arpa domain name pointer 66-230-98-164.dynamic.lte.acsalaska.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.98.230.66.in-addr.arpa	name = 66-230-98-164.dynamic.lte.acsalaska.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
219.89.196.131 attack
Icarus honeypot on github
2020-10-03 22:47:46
95.85.34.53 attack
k+ssh-bruteforce
2020-10-03 22:39:27
88.214.26.90 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-10-03T06:43:04Z
2020-10-03 22:18:29
49.234.213.237 attack
Oct  3 07:58:30 OPSO sshd\[15005\]: Invalid user sinusbot from 49.234.213.237 port 49956
Oct  3 07:58:30 OPSO sshd\[15005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.213.237
Oct  3 07:58:32 OPSO sshd\[15005\]: Failed password for invalid user sinusbot from 49.234.213.237 port 49956 ssh2
Oct  3 08:01:18 OPSO sshd\[15733\]: Invalid user git from 49.234.213.237 port 56820
Oct  3 08:01:18 OPSO sshd\[15733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.213.237
2020-10-03 22:28:32
159.65.85.131 attackspambots
Oct 3 16:38:35 *hidden* sshd[19267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.85.131 Oct 3 16:38:37 *hidden* sshd[19267]: Failed password for invalid user ken from 159.65.85.131 port 35296 ssh2 Oct 3 16:43:16 *hidden* sshd[20986]: Invalid user user2 from 159.65.85.131 port 43262 Oct 3 16:43:16 *hidden* sshd[20986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.85.131 Oct 3 16:43:18 *hidden* sshd[20986]: Failed password for invalid user user2 from 159.65.85.131 port 43262 ssh2
2020-10-03 22:57:47
89.248.168.157 attackbotsspam
firewall-block, port(s): 1063/tcp
2020-10-03 22:55:35
192.35.168.225 attackbotsspam
 TCP (SYN) 192.35.168.225:28799 -> port 9809, len 44
2020-10-03 22:58:04
138.197.36.189 attackbots
Port 22 Scan, PTR: None
2020-10-03 22:16:00
138.197.89.212 attack
TCP port : 31463
2020-10-03 22:17:54
193.112.127.245 attackbots
Oct  3 16:17:34 h2829583 sshd[13737]: Failed password for root from 193.112.127.245 port 36392 ssh2
2020-10-03 22:24:33
18.222.187.40 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-10-03 22:28:45
192.35.169.17 attackspambots
 TCP (SYN) 192.35.169.17:16082 -> port 88, len 44
2020-10-03 22:31:48
202.134.0.9 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 22:15:00
112.85.42.187 attackbots
Oct  3 16:27:30 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2
Oct  3 16:27:33 ns381471 sshd[25371]: Failed password for root from 112.85.42.187 port 12538 ssh2
2020-10-03 22:44:51
139.99.89.202 attackspam
Invalid user sid from 139.99.89.202 port 35196
2020-10-03 22:25:18

Recently Reported IPs

106.51.192.43 79.117.88.229 147.6.129.21 69.28.25.4
51.48.148.168 148.6.137.11 212.217.28.40 47.20.221.71
217.176.102.181 101.69.20.189 231.12.47.6 194.62.225.65
45.111.84.137 49.19.70.251 62.113.120.145 250.209.88.248
225.86.146.100 248.198.103.254 91.55.134.73 17.236.254.252