Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.99.194.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.99.194.152.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:07:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 152.194.99.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.194.99.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.30.75.78 attackbotsspam
Aug 30 06:00:11 ubuntu-2gb-nbg1-dc3-1 sshd[16870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.30.75.78
Aug 30 06:00:14 ubuntu-2gb-nbg1-dc3-1 sshd[16870]: Failed password for invalid user sfsu from 217.30.75.78 port 44265 ssh2
...
2019-08-30 12:15:39
51.38.64.134 attackspambots
WordPress wp-login brute force :: 51.38.64.134 0.160 BYPASS [30/Aug/2019:11:12:07  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-30 12:22:08
91.92.109.43 attackspambots
Aug 30 02:05:02 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2Aug 30 02:05:05 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2Aug 30 02:05:08 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2Aug 30 02:05:10 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2Aug 30 02:05:14 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2Aug 30 02:05:16 rotator sshd\[25524\]: Failed password for root from 91.92.109.43 port 39763 ssh2
...
2019-08-30 11:53:05
165.227.41.202 attack
Aug 30 02:47:28 thevastnessof sshd[7210]: Failed password for root from 165.227.41.202 port 55380 ssh2
...
2019-08-30 12:11:58
201.251.156.11 attack
Aug 30 05:42:44 cp sshd[24467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.251.156.11
Aug 30 05:42:46 cp sshd[24467]: Failed password for invalid user liliana from 201.251.156.11 port 46019 ssh2
Aug 30 05:48:07 cp sshd[28374]: Failed password for root from 201.251.156.11 port 40496 ssh2
2019-08-30 11:53:34
209.160.120.221 attackspambots
(From keith@chiromarketinginc.org) Hi,

Are You Struggling to Grow Your Chiropractic Clinic? With 24,000 Google Searches for Chiropractors EVERY SINGLE DAY, Are YOU Making Sure to Keep Your Clinic in front of People Who Want Your Services? 

chiromarketinginc.org is an agency for Chiropractors focused on getting you 3X more patients by using the power of Social Media & Google Ads. 1000+ Chiro Clinics are using these proven methods to generate more patients online. We have a 14-day free trial to give you the confidence you need. 

The internet is filled with an audience who can be in your next patient list. Will you take action? 

Please email me at keith@chiromarketinginc.org & we will get on a quick call to set up your Free Trial. 

Keith Williams
keith@chiromarketinginc.org
www.chiromarketinginc.org
2019-08-30 12:09:56
220.135.212.118 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-30 11:51:48
82.221.128.191 attackspambots
2019-08-15T14:08:03.692462wiz-ks3 sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191  user=root
2019-08-15T14:08:05.671561wiz-ks3 sshd[9127]: Failed password for root from 82.221.128.191 port 45947 ssh2
2019-08-15T14:08:08.541620wiz-ks3 sshd[9127]: Failed password for root from 82.221.128.191 port 45947 ssh2
2019-08-15T14:08:03.692462wiz-ks3 sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191  user=root
2019-08-15T14:08:05.671561wiz-ks3 sshd[9127]: Failed password for root from 82.221.128.191 port 45947 ssh2
2019-08-15T14:08:08.541620wiz-ks3 sshd[9127]: Failed password for root from 82.221.128.191 port 45947 ssh2
2019-08-15T14:08:03.692462wiz-ks3 sshd[9127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191  user=root
2019-08-15T14:08:05.671561wiz-ks3 sshd[9127]: Failed password for root from 82.221.128.191 port 45947 ssh2
2019-08-1
2019-08-30 12:01:00
106.13.144.8 attackbotsspam
*Port Scan* detected from 106.13.144.8 (CN/China/-). 4 hits in the last 90 seconds
2019-08-30 12:14:53
95.219.213.54 attackspam
Hits on port : 445
2019-08-30 12:26:51
186.236.20.211 attackbots
Aug 29 22:16:26 xeon postfix/smtpd[37542]: warning: unknown[186.236.20.211]: SASL PLAIN authentication failed: authentication failure
2019-08-30 12:04:52
119.90.61.10 attack
Automatic report - Banned IP Access
2019-08-30 12:18:28
206.189.36.69 attackbots
$f2bV_matches
2019-08-30 12:22:28
220.237.149.59 attack
$f2bV_matches
2019-08-30 12:28:29
86.188.246.2 attack
2019-08-29T21:24:17.044819abusebot-2.cloudsearch.cf sshd\[2960\]: Invalid user info from 86.188.246.2 port 44801
2019-08-30 12:21:01

Recently Reported IPs

185.115.85.48 209.83.41.166 89.211.28.135 243.247.78.22
190.234.163.138 25.206.140.163 254.100.143.51 222.241.227.253
46.86.30.112 154.222.114.253 124.66.30.238 168.220.235.174
129.107.208.46 70.97.125.242 181.26.233.42 9.146.54.155
155.80.234.233 255.65.192.44 236.221.121.176 234.207.219.24