Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.66.40.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;97.66.40.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:42:08 CST 2025
;; MSG SIZE  rcvd: 105
Host info
104.40.66.97.in-addr.arpa domain name pointer mail.reversemtgacademy.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.40.66.97.in-addr.arpa	name = mail.reversemtgacademy.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
98.146.212.146 attackspambots
2020-09-06T16:51:00.808545upcloud.m0sh1x2.com sshd[19470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-98-146-212-146.natnow.res.rr.com  user=root
2020-09-06T16:51:02.760422upcloud.m0sh1x2.com sshd[19470]: Failed password for root from 98.146.212.146 port 49798 ssh2
2020-09-07 07:17:30
157.25.173.178 attackspambots
Unauthorized connection attempt from IP address 157.25.173.178 on port 587
2020-09-07 07:28:34
180.190.238.157 attack
Sep  7 00:03:25 rocket sshd[27736]: Failed password for root from 180.190.238.157 port 44611 ssh2
Sep  7 00:06:28 rocket sshd[28233]: Failed password for root from 180.190.238.157 port 62516 ssh2
...
2020-09-07 07:15:34
51.75.122.213 attackspam
SSH login attempts.
2020-09-07 07:23:35
49.235.153.54 attack
Sep  6 20:38:42 home sshd[1024218]: Failed password for invalid user hscroot from 49.235.153.54 port 42998 ssh2
Sep  6 20:40:47 home sshd[1024498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.54  user=root
Sep  6 20:40:49 home sshd[1024498]: Failed password for root from 49.235.153.54 port 45582 ssh2
Sep  6 20:42:59 home sshd[1024745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.153.54  user=root
Sep  6 20:43:01 home sshd[1024745]: Failed password for root from 49.235.153.54 port 48148 ssh2
...
2020-09-07 07:37:39
178.62.37.78 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-09-06T20:15:47Z and 2020-09-06T20:30:28Z
2020-09-07 07:44:20
141.98.81.141 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-06T23:09:39Z
2020-09-07 07:20:45
157.33.162.187 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 07:19:55
51.75.95.185 attackspam
Joomla Vulnerability Attack
2020-09-07 07:49:06
49.69.205.106 attackspambots
Aug 31 16:20:07 nxxxxxxx sshd[13756]: refused connect from 49.69.205.106 (49=
.69.205.106)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.69.205.106
2020-09-07 07:32:23
91.121.134.201 attackbots
SSH login attempts.
2020-09-07 07:26:45
105.242.150.10 attack
Automatic report - Banned IP Access
2020-09-07 07:33:25
42.115.233.172 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 07:27:15
222.89.70.216 attackspam
 TCP (SYN) 222.89.70.216:62926 -> port 22, len 44
2020-09-07 07:47:08
82.62.153.15 attackspambots
(sshd) Failed SSH login from 82.62.153.15 (IT/Italy/host-82-62-153-15.business.telecomitalia.it): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  6 12:53:51 server sshd[10151]: Failed password for root from 82.62.153.15 port 55511 ssh2
Sep  6 13:01:21 server sshd[12539]: Failed password for root from 82.62.153.15 port 59619 ssh2
Sep  6 13:04:27 server sshd[13321]: Failed password for root from 82.62.153.15 port 52445 ssh2
Sep  6 13:07:40 server sshd[14346]: Failed password for root from 82.62.153.15 port 51134 ssh2
Sep  6 13:10:43 server sshd[15258]: Failed password for root from 82.62.153.15 port 55672 ssh2
2020-09-07 07:25:08

Recently Reported IPs

178.252.176.194 87.113.189.173 36.145.112.163 234.152.108.69
197.135.10.15 169.86.156.224 97.75.245.55 47.4.161.231
60.123.30.36 158.13.81.236 138.236.198.217 191.64.76.156
149.44.254.82 159.198.107.103 92.160.226.162 52.45.165.129
228.106.142.130 242.184.23.95 66.125.227.133 46.62.234.162