Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalonia

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.231.64.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63356
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.231.64.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061901 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 20 03:17:39 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 12.64.231.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 12.64.231.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.75.91.69 attackspambots
Unauthorized connection attempt from IP address 36.75.91.69 on Port 445(SMB)
2019-11-29 08:15:43
36.25.243.51 attack
DDoS few hours
2019-11-29 07:50:43
206.189.81.101 attackspambots
Nov 29 01:35:57 server sshd\[3051\]: Invalid user spyros from 206.189.81.101
Nov 29 01:35:57 server sshd\[3051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.81.101 
Nov 29 01:35:58 server sshd\[3051\]: Failed password for invalid user spyros from 206.189.81.101 port 34890 ssh2
Nov 29 02:09:13 server sshd\[11704\]: Invalid user kreator from 206.189.81.101
Nov 29 02:09:13 server sshd\[11704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.81.101 
...
2019-11-29 07:47:41
208.52.154.124 attackbots
11/28/2019-17:46:08.074623 208.52.154.124 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 07:53:05
179.124.34.8 attack
2019-11-29T00:48:00.637103vps751288.ovh.net sshd\[4062\]: Invalid user escalante from 179.124.34.8 port 41938
2019-11-29T00:48:00.650137vps751288.ovh.net sshd\[4062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8
2019-11-29T00:48:03.013155vps751288.ovh.net sshd\[4062\]: Failed password for invalid user escalante from 179.124.34.8 port 41938 ssh2
2019-11-29T00:51:47.147992vps751288.ovh.net sshd\[4066\]: Invalid user wwwadmin from 179.124.34.8 port 59968
2019-11-29T00:51:47.157701vps751288.ovh.net sshd\[4066\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.34.8
2019-11-29 08:01:47
189.186.229.200 attackspambots
Unauthorized connection attempt from IP address 189.186.229.200 on Port 445(SMB)
2019-11-29 08:20:09
113.118.12.229 attackspam
Unauthorized connection attempt from IP address 113.118.12.229 on Port 139(NETBIOS)
2019-11-29 08:22:35
177.23.184.99 attackbotsspam
Nov 29 00:57:27 localhost sshd\[18778\]: Invalid user dovecot from 177.23.184.99 port 60834
Nov 29 00:57:27 localhost sshd\[18778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.184.99
Nov 29 00:57:29 localhost sshd\[18778\]: Failed password for invalid user dovecot from 177.23.184.99 port 60834 ssh2
2019-11-29 08:10:45
36.237.9.109 attackbotsspam
port scan/probe/communication attempt; port 23
2019-11-29 08:00:37
14.175.89.10 attackspam
Unauthorized connection attempt from IP address 14.175.89.10 on Port 445(SMB)
2019-11-29 08:11:47
138.186.176.43 attackspambots
Unauthorized connection attempt from IP address 138.186.176.43 on Port 445(SMB)
2019-11-29 07:52:09
174.54.68.231 attackbotsspam
Probably scraping – several accesses like this spread during the day, time stamps look like it's a bot:
"GET / HTTP/1.1"
"GET /legal HTTP/1.1"
"GET /privacy HTTP/1.1"
2019-11-29 08:00:16
14.98.106.59 attackspam
Unauthorized connection attempt from IP address 14.98.106.59 on Port 445(SMB)
2019-11-29 08:05:10
211.21.48.73 attackspambots
Unauthorized connection attempt from IP address 211.21.48.73 on Port 445(SMB)
2019-11-29 08:21:26
223.131.153.196 attack
Nov 29 00:32:03 andromeda sshd\[29268\]: Invalid user araceli from 223.131.153.196 port 54468
Nov 29 00:32:03 andromeda sshd\[29268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.131.153.196
Nov 29 00:32:05 andromeda sshd\[29268\]: Failed password for invalid user araceli from 223.131.153.196 port 54468 ssh2
2019-11-29 08:04:44

Recently Reported IPs

49.75.145.126 40.85.200.60 103.9.77.80 54.39.167.102
41.122.236.232 179.138.205.206 119.9.73.120 185.57.102.21
64.233.115.220 119.145.148.219 152.89.163.14 193.56.28.105
68.180.108.131 152.149.46.109 192.169.197.81 190.254.51.46
157.230.227.48 104.156.222.124 167.100.103.156 212.112.108.98