Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.251.149.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.251.149.98.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032602 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 27 06:57:23 CST 2022
;; MSG SIZE  rcvd: 106
Host info
98.149.251.66.in-addr.arpa domain name pointer mail249.derbysky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.149.251.66.in-addr.arpa	name = mail249.derbysky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.84.147.141 attackbots
Unauthorized connection attempt from IP address 114.84.147.141 on Port 445(SMB)
2020-06-02 08:06:01
206.189.235.233 attackbots
Jun  1 22:16:26 h2829583 sshd[17834]: Failed password for root from 206.189.235.233 port 36674 ssh2
2020-06-02 07:35:31
81.162.120.75 attackbotsspam
Unauthorized connection attempt from IP address 81.162.120.75 on Port 445(SMB)
2020-06-02 07:57:05
113.161.186.245 attack
Unauthorized connection attempt from IP address 113.161.186.245 on Port 445(SMB)
2020-06-02 08:08:18
49.88.112.111 attackbots
2020-06-02T01:42[Censored Hostname] sshd[13451]: Failed password for root from 49.88.112.111 port 48008 ssh2
2020-06-02T01:42[Censored Hostname] sshd[13451]: Failed password for root from 49.88.112.111 port 48008 ssh2
2020-06-02T01:42[Censored Hostname] sshd[13451]: Failed password for root from 49.88.112.111 port 48008 ssh2[...]
2020-06-02 07:44:29
217.173.76.27 attack
Jun  1 21:28:58 sip sshd[20141]: Failed password for root from 217.173.76.27 port 41443 ssh2
Jun  1 22:02:38 sip sshd[32730]: Failed password for root from 217.173.76.27 port 34137 ssh2
2020-06-02 08:03:39
186.155.22.103 attackbots
Unauthorized connection attempt detected from IP address 186.155.22.103 to port 445
2020-06-02 07:58:24
167.172.181.41 attack
Automatic report - XMLRPC Attack
2020-06-02 07:38:54
217.182.70.150 attack
Jun  1 23:21:10 server sshd[3200]: Failed password for root from 217.182.70.150 port 54814 ssh2
Jun  1 23:24:51 server sshd[3343]: Failed password for root from 217.182.70.150 port 60150 ssh2
...
2020-06-02 07:43:53
162.243.139.150 attack
trying to access non-authorized port
2020-06-02 07:59:09
37.252.190.224 attack
2020-06-02T00:16:33.198810+02:00  sshd[3101]: Failed password for root from 37.252.190.224 port 58454 ssh2
2020-06-02 07:35:11
35.193.252.83 attackspam
Jun  2 00:18:07 legacy sshd[30609]: Failed password for root from 35.193.252.83 port 37446 ssh2
Jun  2 00:21:36 legacy sshd[30761]: Failed password for root from 35.193.252.83 port 42630 ssh2
...
2020-06-02 07:38:25
186.7.102.227 attackbotsspam
Unauthorized connection attempt from IP address 186.7.102.227 on Port 445(SMB)
2020-06-02 07:52:12
177.38.98.74 attackspam
Unauthorized connection attempt from IP address 177.38.98.74 on Port 445(SMB)
2020-06-02 08:12:13
159.65.149.139 attackbotsspam
Jun  2 01:49:45 xeon sshd[11894]: Failed password for root from 159.65.149.139 port 58708 ssh2
2020-06-02 08:05:45

Recently Reported IPs

221.2.178.57 136.222.54.8 208.167.255.214 53.136.84.97
14.78.166.192 27.12.132.94 72.32.136.101 167.31.100.59
11.61.50.194 29.85.150.28 156.155.91.234 6.45.155.57
43.95.176.69 12.25.76.135 3.157.255.64 37.96.10.51
176.153.192.76 203.106.168.60 17.138.50.195 175.74.89.20