Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Francisco

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Sprious LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.84.90.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26050
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.84.90.14.			IN	A

;; AUTHORITY SECTION:
.			1861	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062400 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 24 16:06:55 CST 2019
;; MSG SIZE  rcvd: 115

Host info
14.90.84.66.in-addr.arpa domain name pointer host-66-84-90-14.static.sprious.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.90.84.66.in-addr.arpa	name = host-66-84-90-14.static.sprious.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.161.5 attackspambots
8009/tcp 50997/tcp 888/tcp...
[2020-07-25/09-25]86pkt,63pt.(tcp),5pt.(udp)
2020-09-25 22:46:24
154.28.188.169 attack
QNAP login try...
2020-09-25 23:08:39
13.90.128.104 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-25 22:45:04
40.68.90.206 attackspambots
Invalid user git from 40.68.90.206 port 44998
2020-09-25 22:55:50
73.165.179.101 attackspambots
Sep 24 16:39:04 aragorn sshd[24447]: Invalid user admin from 73.165.179.101
Sep 24 16:39:05 aragorn sshd[24449]: Invalid user admin from 73.165.179.101
Sep 24 16:39:05 aragorn sshd[24451]: Invalid user admin from 73.165.179.101
Sep 24 16:39:06 aragorn sshd[24453]: Invalid user admin from 73.165.179.101
...
2020-09-25 22:39:08
54.39.125.16 attackspam
E-mail Spam RBL
...
2020-09-25 22:57:33
49.235.83.136 attackspam
Invalid user redmine from 49.235.83.136 port 52096
2020-09-25 23:05:44
45.148.10.65 attack
Invalid user ubuntu from 45.148.10.65 port 39624
2020-09-25 23:20:58
122.14.18.238 attackbots
Brute force blocker - service: proftpd1 - aantal: 155 - Wed Sep  5 10:50:15 2018
2020-09-25 22:52:11
51.116.184.135 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "coronaplayers" at 2020-09-25T14:40:15Z
2020-09-25 22:43:06
192.241.246.167 attackbots
scans once in preceeding hours on the ports (in chronological order) 27927 resulting in total of 44 scans from 192.241.128.0/17 block.
2020-09-25 23:12:28
51.116.113.80 attack
Sep 25 15:48:05 cdc sshd[20997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.116.113.80  user=root
Sep 25 15:48:07 cdc sshd[20997]: Failed password for invalid user root from 51.116.113.80 port 1628 ssh2
2020-09-25 22:48:53
112.112.187.95 attackspam
Brute force blocker - service: proftpd1 - aantal: 92 - Wed Sep  5 11:30:16 2018
2020-09-25 22:47:19
187.32.29.11 attack
445/tcp
[2020-09-24]1pkt
2020-09-25 23:14:46
118.163.91.125 attackbots
(sshd) Failed SSH login from 118.163.91.125 (TW/Taiwan/118-163-91-125.HINET-IP.hinet.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 25 09:05:57 server sshd[3374]: Invalid user alumni from 118.163.91.125 port 32773
Sep 25 09:05:59 server sshd[3374]: Failed password for invalid user alumni from 118.163.91.125 port 32773 ssh2
Sep 25 09:09:22 server sshd[4253]: Invalid user user from 118.163.91.125 port 56185
Sep 25 09:09:24 server sshd[4253]: Failed password for invalid user user from 118.163.91.125 port 56185 ssh2
Sep 25 09:11:48 server sshd[4790]: Invalid user glenn from 118.163.91.125 port 47125
2020-09-25 23:06:20

Recently Reported IPs

177.28.146.231 143.139.184.145 80.210.17.18 185.187.1.125
62.134.56.253 64.124.6.22 72.24.165.180 221.69.231.236
167.160.75.1 212.198.52.235 142.245.145.100 212.92.114.178
207.195.203.131 125.106.249.110 125.124.89.100 1.9.52.252
107.161.189.226 189.35.213.242 37.179.12.55 99.137.150.180