Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wake Forest

Region: North Carolina

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.57.104.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.57.104.91.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 11:56:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
91.104.57.66.in-addr.arpa domain name pointer syn-066-057-104-091.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
91.104.57.66.in-addr.arpa	name = syn-066-057-104-091.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.216.97 attack
Sep 23 01:15:21 piServer sshd[2469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.216.97 
Sep 23 01:15:23 piServer sshd[2469]: Failed password for invalid user ahmed from 142.93.216.97 port 55418 ssh2
Sep 23 01:19:37 piServer sshd[3087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.216.97 
...
2020-09-23 07:23:48
45.55.222.162 attack
Invalid user andrew from 45.55.222.162 port 40498
2020-09-23 07:36:49
106.13.173.137 attackspambots
Invalid user boss from 106.13.173.137 port 40320
2020-09-23 07:55:15
149.56.12.88 attack
Sep 22 23:50:48 vserver sshd\[30893\]: Invalid user webmaster from 149.56.12.88Sep 22 23:50:51 vserver sshd\[30893\]: Failed password for invalid user webmaster from 149.56.12.88 port 60060 ssh2Sep 22 23:54:11 vserver sshd\[31230\]: Invalid user bert from 149.56.12.88Sep 22 23:54:13 vserver sshd\[31230\]: Failed password for invalid user bert from 149.56.12.88 port 40502 ssh2
...
2020-09-23 07:54:46
31.176.177.255 attack
Unauthorized connection attempt from IP address 31.176.177.255 on Port 445(SMB)
2020-09-23 07:38:13
183.82.96.76 attackspam
Sep 22 19:19:31 NPSTNNYC01T sshd[14396]: Failed password for root from 183.82.96.76 port 23548 ssh2
Sep 22 19:23:34 NPSTNNYC01T sshd[14771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.96.76
Sep 22 19:23:36 NPSTNNYC01T sshd[14771]: Failed password for invalid user minecraft from 183.82.96.76 port 58934 ssh2
...
2020-09-23 07:33:10
138.197.222.141 attackbots
Sep 23 01:06:18 host sshd[6691]: Invalid user tom from 138.197.222.141 port 43402
...
2020-09-23 07:34:02
66.129.102.52 attackbotsspam
Unauthorized connection attempt from IP address 66.129.102.52 on Port 445(SMB)
2020-09-23 07:49:36
189.162.99.17 attackspam
Invalid user teamspeak from 189.162.99.17 port 40170
2020-09-23 07:32:58
191.55.190.167 attackbotsspam
Unauthorized connection attempt from IP address 191.55.190.167 on Port 445(SMB)
2020-09-23 07:59:00
220.133.244.216 attack
Found on   CINS badguys     / proto=6  .  srcport=11573  .  dstport=23  .     (3075)
2020-09-23 07:26:41
14.29.210.146 attack
Sep 22 23:28:17 ajax sshd[27907]: Failed password for root from 14.29.210.146 port 35576 ssh2
2020-09-23 07:29:43
31.47.53.21 attackspam
Unauthorized connection attempt from IP address 31.47.53.21 on Port 445(SMB)
2020-09-23 07:56:03
159.65.229.200 attackspambots
2020-09-22 04:18:44 server sshd[22114]: Failed password for invalid user root from 159.65.229.200 port 41964 ssh2
2020-09-23 07:37:40
45.190.132.30 attackbotsspam
Invalid user ubuntu from 45.190.132.30 port 46744
2020-09-23 07:22:56

Recently Reported IPs

174.18.165.196 9.187.66.37 62.212.108.232 191.193.124.102
136.190.127.215 103.24.127.211 154.113.230.88 124.98.32.31
118.216.124.57 33.240.84.141 92.172.102.240 172.48.82.49
205.70.23.52 73.74.191.153 227.203.40.42 166.13.131.67
220.219.13.42 248.182.243.191 222.33.112.119 86.247.49.197