Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.255.82.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33385
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.255.82.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 16:08:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
148.82.255.66.in-addr.arpa domain name pointer uslec-66-255-82-148.cust.uslec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.82.255.66.in-addr.arpa	name = uslec-66-255-82-148.cust.uslec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
205.185.116.156 attackbotsspam
 TCP (SYN) 205.185.116.156:55888 -> port 8080, len 44
2020-07-20 06:27:49
71.6.146.130 attackspam
Unauthorized connection attempt detected from IP address 71.6.146.130 to port 10000
2020-07-20 06:08:00
218.92.0.145 attackbotsspam
prod11
...
2020-07-20 05:54:10
185.136.159.30 attackspam
Automatic report - Banned IP Access
2020-07-20 05:57:55
88.204.242.54 attackspam
IP 88.204.242.54 attacked honeypot on port: 1433 at 7/19/2020 9:01:57 AM
2020-07-20 05:58:50
112.64.33.38 attackspam
Jul 19 22:50:31 vps639187 sshd\[1307\]: Invalid user school from 112.64.33.38 port 38411
Jul 19 22:50:31 vps639187 sshd\[1307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.33.38
Jul 19 22:50:33 vps639187 sshd\[1307\]: Failed password for invalid user school from 112.64.33.38 port 38411 ssh2
...
2020-07-20 06:02:31
104.140.188.50 attackspambots
07/19/2020-13:16:09.929497 104.140.188.50 Protocol: 6 ET SCAN Suspicious inbound to mySQL port 3306
2020-07-20 05:50:45
83.169.216.207 attackspambots
20/7/19@12:02:24: FAIL: Alarm-Network address from=83.169.216.207
...
2020-07-20 06:00:15
192.241.239.139 attack
Unauthorized connection attempt from IP address 192.241.239.139 on Port 3389(RDP)
2020-07-20 05:53:25
37.49.224.224 attackbots
60001/tcp 22/tcp...
[2020-06-30/07-19]9pkt,2pt.(tcp)
2020-07-20 06:05:04
113.105.92.174 attackspam
 TCP (SYN) 113.105.92.174:43000 -> port 1433, len 44
2020-07-20 05:56:53
191.103.65.170 attackbots
Unauthorized connection attempt detected from IP address 191.103.65.170 to port 23
2020-07-20 06:22:41
122.51.31.60 attack
Jul 19 18:02:37 ajax sshd[10316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.31.60 
Jul 19 18:02:39 ajax sshd[10316]: Failed password for invalid user uju from 122.51.31.60 port 44438 ssh2
2020-07-20 06:05:26
139.59.116.115 attack
" "
2020-07-20 05:58:22
37.57.218.243 attack
20 attempts against mh-misbehave-ban on sonic
2020-07-20 06:13:01

Recently Reported IPs

22.118.164.15 122.22.228.4 95.178.62.91 29.108.144.186
95.19.125.191 64.152.36.132 68.166.15.165 215.26.120.18
213.163.72.233 214.6.242.15 89.109.187.55 106.2.39.229
175.119.37.39 179.87.225.183 142.52.64.176 34.40.60.138
6.195.52.138 211.249.148.16 251.106.184.95 204.173.194.61