Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.154.148.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57948
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.154.148.66.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102001 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 21 03:23:13 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 66.148.154.99.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.148.154.99.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
173.82.154.230 attack
Sep 20 12:24:45 sshgateway sshd\[25521\]: Invalid user testcase from 173.82.154.230
Sep 20 12:24:45 sshgateway sshd\[25521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.154.230
Sep 20 12:24:47 sshgateway sshd\[25521\]: Failed password for invalid user testcase from 173.82.154.230 port 41550 ssh2
2019-09-20 23:12:27
132.148.18.178 attackbotsspam
WordPress wp-login brute force :: 132.148.18.178 0.052 BYPASS [21/Sep/2019:01:26:28  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 3989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-20 23:30:13
49.214.162.228 attackbotsspam
Port Scan: TCP/445
2019-09-20 23:08:49
50.4.181.23 attackbotsspam
Port Scan: TCP/443
2019-09-20 22:53:54
104.211.79.54 attackbotsspam
Sep 20 06:11:18 vps200512 sshd\[23648\]: Invalid user oracle from 104.211.79.54
Sep 20 06:11:18 vps200512 sshd\[23648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.79.54
Sep 20 06:11:21 vps200512 sshd\[23648\]: Failed password for invalid user oracle from 104.211.79.54 port 59766 ssh2
Sep 20 06:16:30 vps200512 sshd\[23767\]: Invalid user zai from 104.211.79.54
Sep 20 06:16:30 vps200512 sshd\[23767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.79.54
2019-09-20 23:31:00
167.71.83.203 attack
Sep 20 17:16:34 MK-Soft-VM3 sshd\[22216\]: Invalid user qiang from 167.71.83.203 port 57787
Sep 20 17:16:34 MK-Soft-VM3 sshd\[22216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.83.203
Sep 20 17:16:36 MK-Soft-VM3 sshd\[22216\]: Failed password for invalid user qiang from 167.71.83.203 port 57787 ssh2
...
2019-09-20 23:20:11
103.89.90.196 attackbots
SASL broute force
2019-09-20 23:34:36
87.225.9.251 attackbotsspam
Tried to hack my Synology NAS.

Warning	Verbindung	2019/09/20 16:54:53	admin	User [admin] from [87.225.9.251] failed to log in via [DSM] due to authorization failure.
Warning	Verbindung	2019/09/20 16:54:47	admin	User [admin] from [87.225.9.251] failed to log in via [DSM] due to authorization failure.
Warning	Verbindung	2019/09/20 16:54:42	admin	User [admin] from [87.225.9.251] failed to log in via [DSM] due to authorization failure.
2019-09-20 23:27:26
108.178.64.70 attackspam
Port Scan: UDP/137
2019-09-20 22:44:29
51.75.171.29 attackspam
Sep 20 14:12:56 SilenceServices sshd[23119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.171.29
Sep 20 14:12:59 SilenceServices sshd[23119]: Failed password for invalid user danny from 51.75.171.29 port 60798 ssh2
Sep 20 14:16:44 SilenceServices sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.171.29
2019-09-20 23:24:32
67.225.220.153 attack
Port Scan: TCP/445
2019-09-20 22:50:31
68.98.218.116 attackspam
Port Scan: UDP/137
2019-09-20 22:50:06
167.102.193.167 attackspambots
Port Scan: UDP/137
2019-09-20 23:03:09
190.17.117.73 attack
Port Scan: TCP/34567
2019-09-20 23:00:46
94.102.56.181 attackbotsspam
firewall-block, port(s): 9088/tcp, 9092/tcp, 9093/tcp, 9095/tcp
2019-09-20 23:06:02

Recently Reported IPs

101.109.100.221 24.26.204.231 71.156.33.60 213.13.15.220
196.234.236.149 75.98.175.112 122.132.30.16 86.153.162.227
81.206.123.6 138.118.207.132 211.144.8.186 118.126.88.207
12.95.89.113 175.45.60.94 194.212.7.139 93.40.215.27
46.229.134.166 40.80.190.124 75.144.193.59 71.6.233.231