IP: 66.58.164.207 United States Location: Eagle River, Alaska, United States
City:
Eagle River
Region:
Alaska
Country:
United States
Postal Code:
99577
Latitude:
61.311
Longitude:
-149.5165
NetRange: 66.58.128.0 - 66.58.255.255
CIDR: 66.58.128.0/17
NetName: GCI-ALASKA-2BLK
NetHandle: NET-66-58-128-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS8047
Organization: GENERAL COMMUNICATION, INC. (GENER-72)
RegDate: 2002-01-17
Updated: 2014-04-15
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://rdap.arin.net/registry/ip/66.58.128.0

OrgName: GENERAL COMMUNICATION, INC.
OrgId: GENER-72
Address: 2550 Denali Street
Address: Suite 1000
City: Anchorage
StateProv: AK
PostalCode: 99503
Country: US
RegDate: 2004-01-09
Updated: 2023-11-02
Ref: https://rdap.arin.net/registry/entity/GENER-72

ReferralServer: rwhois://rwhois.gci.net:4321

OrgRoutingHandle: GRS342-ARIN
OrgRoutingName: GCI Routing Security
OrgRoutingPhone: +1-907-868-0100
OrgRoutingEmail: tsroutingsecurity@gci.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/GRS342-ARIN

OrgAbuseHandle: GNS10-ARIN
OrgAbuseName: GCI Network Security
OrgAbusePhone: +1-907-868-5330
OrgAbuseEmail: security@gci.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/GNS10-ARIN

OrgTechHandle: GDA5-ORG-ARIN
OrgTechName: GCI IP Administrator
OrgTechPhone: +1-907-868-0100
OrgTechEmail: registrar@gci.com
OrgTechRef: https://rdap.arin.net/registry/entity/GDA5-ORG-ARIN
DNS BlackList results:
Most recent complaints on 66.58.164.207
Complaint by Aleks :

X-Spam-Status: Yes, score=18.6 required=3.0 tests=BAYES_99,BAYES_999, CK_HELO_DYNAMIC_SPLIT_IP,FSL_BULK_SIG,HELO_MISC_IP,HTML_MESSAGE, JAM_LARGE_FONT_SIZE,JAM_PHARMACY_BD,MIME_BASE64_TEXT,MIME_HTML_ONLY, NULL_IN_BODY,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK, RCVD_ILLEGAL_IP,RCVD_IN_XBL,RDNS_DYNAMIC,TVD_QUAL_MEDS,TVD_RCVD_IP autolearn=spam autolearn_force=no version=3.4.1 X-Spam-Report: * 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL * [66.58.164.207 listed in zen.spamhaus.org] * 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% * [score: 1.0000] * 1.3 RCVD_ILLEGAL_IP Received: contains illegal IP address * 1.5 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname * (Split IP) * 0.0 TVD_RCVD_IP Message was received from an IP address * 0.1 JAM_PHARMACY_BD BODY: Body contains pharmacy, medication etc * 2.5 TVD_QUAL_MEDS BODY: The body matches phrases such as "quality meds" * or "quality medication" * 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100% * [score: 1.0000] * 0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts * 0.0 HTML_MESSAGE BODY: HTML included in message * 0.5 JAM_LARGE_FONT_SIZE RAW: Body of mail contains parts with very large * font * 1.7 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding * 1.6 NULL_IN_BODY FULL: Message has NUL (ASCII 0) byte in message * 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% * [cf: 100] * 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level * above 50% * [cf: 100] * 0.9 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) * 0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe * 1.0 RDNS_DYNAMIC Delivered to internal network by host with * dynamic-looking rDNS * 0.0 HELO_MISC_IP Looking for more Dynamic IP Relays * Received: from 207-164-58-66.gci.net (207-164-58-66.gci.net [66.58.164.207])

Reported on: 20th, Nov. 2016

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 66.58.164.207 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.