Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.252.198.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.252.198.59.			IN	A

;; AUTHORITY SECTION:
.			190	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121100 1800 900 604800 86400

;; Query time: 368 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 00:15:43 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 59.198.252.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 59.198.252.66.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
45.229.106.106 attack
Aug  3 02:29:25 webhost01 sshd[30147]: Failed password for root from 45.229.106.106 port 30555 ssh2
...
2019-08-03 05:08:20
148.70.100.235 attackspambots
Aug  2 19:06:07 shared07 sshd[20438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.100.235  user=r.r
Aug  2 19:06:10 shared07 sshd[20438]: Failed password for r.r from 148.70.100.235 port 42692 ssh2
Aug  2 19:06:10 shared07 sshd[20438]: Received disconnect from 148.70.100.235 port 42692:11: Bye Bye [preauth]
Aug  2 19:06:10 shared07 sshd[20438]: Disconnected from 148.70.100.235 port 42692 [preauth]
Aug  2 19:12:53 shared07 sshd[21748]: Invalid user user from 148.70.100.235
Aug  2 19:12:53 shared07 sshd[21748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.100.235
Aug  2 19:12:54 shared07 sshd[21748]: Failed password for invalid user user from 148.70.100.235 port 38276 ssh2
Aug  2 19:12:57 shared07 sshd[21748]: Received disconnect from 148.70.100.235 port 38276:11: Bye Bye [preauth]
Aug  2 19:12:57 shared07 sshd[21748]: Disconnected from 148.70.100.235 port 38276 [preauth]
........
-------------------------------
2019-08-03 04:58:43
189.240.94.115 attack
2019-08-02T22:31:42.911349  sshd[22355]: Invalid user conradina. from 189.240.94.115 port 4340
2019-08-02T22:31:42.927136  sshd[22355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.94.115
2019-08-02T22:31:42.911349  sshd[22355]: Invalid user conradina. from 189.240.94.115 port 4340
2019-08-02T22:31:45.316728  sshd[22355]: Failed password for invalid user conradina. from 189.240.94.115 port 4340 ssh2
2019-08-02T22:36:51.854335  sshd[22395]: Invalid user subhana from 189.240.94.115 port 4341
...
2019-08-03 04:55:14
171.244.140.174 attackbots
Aug  2 22:42:43 eventyay sshd[32571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
Aug  2 22:42:45 eventyay sshd[32571]: Failed password for invalid user ea from 171.244.140.174 port 23727 ssh2
Aug  2 22:48:02 eventyay sshd[1377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174
...
2019-08-03 04:56:41
36.112.137.55 attackspambots
Aug  2 21:39:47 debian sshd\[783\]: Invalid user confluence from 36.112.137.55 port 39095
Aug  2 21:39:47 debian sshd\[783\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
...
2019-08-03 05:19:47
68.183.122.211 attack
$f2bV_matches
2019-08-03 04:39:11
178.254.179.124 attackspam
Honeypot attack, port: 23, PTR: free-179-124.mediaworksit.net.
2019-08-03 05:21:23
92.222.66.234 attackspambots
2019-08-02T21:07:44.312770abusebot-6.cloudsearch.cf sshd\[29900\]: Invalid user git from 92.222.66.234 port 41478
2019-08-03 05:12:11
152.136.95.118 attackbots
Aug  2 22:30:26 * sshd[15708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
Aug  2 22:30:27 * sshd[15708]: Failed password for invalid user kelvin from 152.136.95.118 port 60716 ssh2
2019-08-03 04:48:36
128.199.88.176 attackspam
Aug  2 22:58:00 ubuntu-2gb-nbg1-dc3-1 sshd[663]: Failed password for root from 128.199.88.176 port 54860 ssh2
Aug  2 23:07:29 ubuntu-2gb-nbg1-dc3-1 sshd[1336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.88.176
...
2019-08-03 05:24:55
37.52.9.242 attack
Aug  2 22:54:13 dedicated sshd[30848]: Invalid user ubu from 37.52.9.242 port 59068
2019-08-03 05:09:16
101.207.113.73 attack
Aug  2 22:49:35 lnxded63 sshd[10139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.207.113.73
2019-08-03 05:35:09
165.227.92.185 attackspam
Aug  2 22:16:34 ArkNodeAT sshd\[22972\]: Invalid user tuan from 165.227.92.185
Aug  2 22:16:34 ArkNodeAT sshd\[22972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.92.185
Aug  2 22:16:36 ArkNodeAT sshd\[22972\]: Failed password for invalid user tuan from 165.227.92.185 port 58508 ssh2
2019-08-03 05:28:33
59.52.97.130 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-03 05:10:10
49.88.112.64 attackspambots
Aug  2 20:13:29 *** sshd[23477]: User root from 49.88.112.64 not allowed because not listed in AllowUsers
2019-08-03 05:24:21

Recently Reported IPs

42.120.161.43 34.183.47.142 38.237.6.31 227.2.133.184
116.12.224.232 54.176.72.219 240e:58:2:200:100::89 68.175.13.133
71.22.92.146 63.82.164.98 144.88.235.74 19.222.17.135
29.138.232.160 45.136.111.42 35.233.159.237 95.98.117.12
34.232.106.98 94.172.86.144 131.21.102.31 34.92.209.239