Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Springfield

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Illinois Century Network

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.99.142.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8072
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;66.99.142.135.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 13 04:22:14 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 135.142.99.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 135.142.99.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.39.102.168 attackspambots
30 attempts against mh_ha-misbehave-ban on flare.magehost.pro
2020-01-18 06:11:28
186.225.60.102 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 06:07:34
218.255.139.205 attack
Honeypot attack, port: 445, PTR: static.reserve.wtt.net.hk.
2020-01-18 06:14:12
74.95.1.114 attack
proto=tcp  .  spt=38992  .  dpt=25  .     Found on   Dark List de      (643)
2020-01-18 05:53:05
72.235.163.245 attackbots
Unauthorized connection attempt detected from IP address 72.235.163.245 to port 8000 [J]
2020-01-18 05:56:48
101.71.2.165 attackspam
Jan 17 21:03:25 vlre-nyc-1 sshd\[6326\]: Invalid user c1 from 101.71.2.165
Jan 17 21:03:25 vlre-nyc-1 sshd\[6326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.165
Jan 17 21:03:27 vlre-nyc-1 sshd\[6326\]: Failed password for invalid user c1 from 101.71.2.165 port 4003 ssh2
Jan 17 21:11:43 vlre-nyc-1 sshd\[6487\]: Invalid user demos from 101.71.2.165
Jan 17 21:11:43 vlre-nyc-1 sshd\[6487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.165
...
2020-01-18 06:27:49
182.237.219.233 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-18 06:13:59
185.202.61.123 attackspambots
Jan 17 09:35:43 home sshd[5974]: Invalid user treino from 185.202.61.123 port 47442
Jan 17 09:35:43 home sshd[5974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.61.123
Jan 17 09:35:43 home sshd[5974]: Invalid user treino from 185.202.61.123 port 47442
Jan 17 09:35:45 home sshd[5974]: Failed password for invalid user treino from 185.202.61.123 port 47442 ssh2
Jan 17 11:28:15 home sshd[6620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.61.123  user=pi
Jan 17 11:28:16 home sshd[6620]: Failed password for pi from 185.202.61.123 port 48728 ssh2
Jan 17 12:22:55 home sshd[6909]: Invalid user calloni from 185.202.61.123 port 43434
Jan 17 12:22:55 home sshd[6909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.202.61.123
Jan 17 12:22:55 home sshd[6909]: Invalid user calloni from 185.202.61.123 port 43434
Jan 17 12:22:57 home sshd[6909]: Failed password for invalid user ca
2020-01-18 06:21:15
59.11.248.116 attackspambots
KR__<177>1579295521 [1:2403390:54690] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 46 [Classification: Misc Attack] [Priority: 2] {TCP} 59.11.248.116:34908
2020-01-18 06:12:16
51.83.74.203 attackspambots
Jan 17 22:34:49 meumeu sshd[11075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.203 
Jan 17 22:34:51 meumeu sshd[11075]: Failed password for invalid user jsanchez from 51.83.74.203 port 38714 ssh2
Jan 17 22:35:58 meumeu sshd[11231]: Failed password for root from 51.83.74.203 port 43403 ssh2
...
2020-01-18 05:56:23
112.85.42.188 attack
01/17/2020-17:22:32.977287 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-18 06:22:54
45.84.221.142 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-18 06:11:49
112.78.1.247 attackspam
Jan 17 21:55:00 XXX sshd[56601]: Invalid user admin from 112.78.1.247 port 52376
2020-01-18 06:01:54
168.194.86.214 attackspambots
Automatic report - Port Scan Attack
2020-01-18 06:15:27
92.118.161.21 attackspambots
Unauthorized connection attempt detected from IP address 92.118.161.21 to port 2001 [J]
2020-01-18 05:59:12

Recently Reported IPs

107.18.154.67 188.156.114.43 94.246.155.169 52.12.118.159
253.9.157.209 83.238.95.247 100.181.116.218 155.103.179.129
50.32.114.91 184.67.195.109 166.47.205.35 92.160.15.115
119.49.91.198 85.23.199.113 226.254.234.105 91.215.91.152
84.127.43.242 126.200.65.7 136.172.162.68 63.199.71.16