66.58.128-191.x IP Lookup - United States
IP addresses in the 66.58.128-191.x range (66.58.0.0 - 66.58.255.255 network). 2 abuse reports have been filed for IPs in this range.
- 66.58.134.121, 66.58.144.151, 66.58.188.20, 66.58.141.40, 66.58.146.206, 66.58.136.88
- 66.58.187.196, 66.58.152.120, 66.58.139.25, 66.58.149.247, 66.58.182.26, 66.58.138.227
- 66.58.144.58, 66.58.181.242, 66.58.175.184, 66.58.140.131, 66.58.184.175, 66.58.173.116
- 66.58.175.48, 66.58.136.196, 66.58.170.136, 66.58.175.21, 66.58.185.59, 66.58.152.73
- 66.58.179.124, 66.58.177.19, 66.58.149.193, 66.58.141.11, 66.58.177.190, 66.58.146.80
- 66.58.136.194, 66.58.189.148, 66.58.133.70, 66.58.138.234, 66.58.163.25, 66.58.129.73
- 66.58.171.197, 66.58.128.22, 66.58.145.231, 66.58.135.112, 66.58.170.187, 66.58.142.122
- 66.58.130.109, 66.58.168.185, 66.58.174.167, 66.58.188.192, 66.58.184.157, 66.58.128.107
- 66.58.173.196, 66.58.132.255, 66.58.154.180, 66.58.145.70, 66.58.137.56, 66.58.137.159
- 66.58.134.176, 66.58.167.71, 66.58.178.204, 66.58.175.178, 66.58.132.82, 66.58.172.107
- 66.58.129.60, 66.58.173.113, 66.58.145.58, 66.58.165.168, 66.58.139.209, 66.58.150.207
- 66.58.163.163, 66.58.179.140, 66.58.164.70, 66.58.133.56, 66.58.164.146, 66.58.140.107
- 66.58.146.11, 66.58.147.5, 66.58.179.227, 66.58.172.53, 66.58.162.148, 66.58.145.79
- 66.58.143.144, 66.58.191.153, 66.58.171.116, 66.58.151.153, 66.58.133.85, 66.58.153.49
- 66.58.151.27, 66.58.173.209, 66.58.164.208, 66.58.164.1, 66.58.171.2, 66.58.162.135
- 66.58.134.101, 66.58.172.246, 66.58.134.61, 66.58.174.81, 66.58.186.12, 66.58.165.136
- 66.58.162.187, 66.58.152.23, 66.58.164.185, 66.58.186.252, 66.58.145.159, 66.58.162.34
- 66.58.133.39, 66.58.140.228, 66.58.175.63, 66.58.183.114, 66.58.157.206, 66.58.187.16
- 66.58.147.158, 66.58.128.62, 66.58.167.116, 66.58.170.86, 66.58.152.184, 66.58.137.156
- 66.58.175.253, 66.58.187.248, 66.58.155.210, 66.58.177.38, 66.58.190.64, 66.58.188.144
- 66.58.183.222, 66.58.173.6, 66.58.184.4, 66.58.165.88, 66.58.142.72, 66.58.162.151
- 66.58.162.178, 66.58.167.18, 66.58.161.112, 66.58.183.51, 66.58.163.209, 66.58.154.115
- 66.58.141.121, 66.58.172.115, 66.58.161.128, 66.58.171.99, 66.58.145.75, 66.58.144.203
- 66.58.139.158, 66.58.157.181, 66.58.168.128, 66.58.175.98, 66.58.179.202, 66.58.188.181
- 66.58.188.178, 66.58.169.252, 66.58.153.131, 66.58.176.58, 66.58.183.164, 66.58.160.196
- 66.58.166.128, 66.58.175.34, 66.58.155.108, 66.58.130.106, 66.58.174.245, 66.58.129.108
- 66.58.130.22, 66.58.187.159, 66.58.164.183, 66.58.130.185, 66.58.130.111, 66.58.136.95
- 66.58.150.158, 66.58.177.189, 66.58.171.219, 66.58.158.204, 66.58.167.119, 66.58.140.119
- 66.58.141.80, 66.58.175.101, 66.58.136.86, 66.58.183.10, 66.58.157.29, 66.58.176.105
- 66.58.178.196, 66.58.162.127, 66.58.171.79, 66.58.158.176, 66.58.170.23, 66.58.166.131
- 66.58.189.151, 66.58.189.77, 66.58.162.130, 66.58.183.138, 66.58.144.226, 66.58.183.218
- 66.58.179.3, 66.58.167.167, 66.58.180.122, 66.58.150.235, 66.58.166.44, 66.58.149.232
- 66.58.179.50, 66.58.167.194, 66.58.174.44, 66.58.135.15, 66.58.172.130, 66.58.186.237
- 66.58.155.114, 66.58.167.175, 66.58.169.47, 66.58.147.209, 66.58.183.143, 66.58.181.241
- 66.58.164.126, 66.58.130.48, 66.58.169.209, 66.58.129.155, 66.58.162.255, 66.58.141.175
- 66.58.181.255, 66.58.139.126, 66.58.179.146, 66.58.162.75, 66.58.167.126, 66.58.138.94
- 66.58.158.220, 66.58.168.110, 66.58.146.16, 66.58.174.196, 66.58.161.170, 66.58.130.129
- 66.58.142.211, 66.58.160.114, 66.58.152.234, 66.58.182.173, 66.58.157.254, 66.58.154.147
- 66.58.173.236, 66.58.165.46, 66.58.142.177, 66.58.137.115, 66.58.187.167, 66.58.129.106
- 66.58.140.63, 66.58.178.238, 66.58.167.241, 66.58.184.48, 66.58.182.107, 66.58.139.73
- 66.58.152.149, 66.58.142.42, 66.58.134.245, 66.58.135.74, 66.58.186.199, 66.58.143.2
- 66.58.129.205, 66.58.153.61, 66.58.129.21, 66.58.132.65, 66.58.177.112, 66.58.158.189
- 66.58.150.45, 66.58.189.162, 66.58.180.63, 66.58.134.25
Showing 256 of 16,384 IPs (66.58.134.121 to 66.58.134.25). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

66.58.164.207
Complaint by Aleks :
X-Spam-Status: Yes, score=18.6 required=3.0 tests=BAYES_99,BAYES_999, CK_HELO_DYNAMIC_SPLIT_IP,FSL_BULK_SIG,HELO_MISC_IP,HTML_MESSAGE, JAM_LARGE_FONT_SIZE,JAM_PHARMACY_BD,MIME_BASE64_TEXT,MIME_HTML_ONLY, NULL_IN_BODY,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100,RAZOR2_CHECK, RCVD_ILLEGAL_IP,RCVD_IN_XBL,RDNS_DYNAMIC,TVD_QUAL_MEDS,TVD_RCVD_IP autolearn=spam autolearn_force=no version=3.4.1 X-Spam-Report: * 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL * [66.58.164.207 listed in zen.spamhaus.org] * 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% * [score: 1.0000] * 1.3 RCVD_ILLEGAL_IP Received: contains illegal IP address * 1.5 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname * (Split IP) * 0.0 TVD_RCVD_IP Message was received from an IP address * 0.1 JAM_PHARMACY_BD BODY: Body contains pharmacy, medication etc * 2.5 TVD_QUAL_MEDS BODY: The body matches phrases such as "quality meds" * or "quality medication" * 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100% * [score: 1.0000] * 0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts * 0.0 HTML_MESSAGE BODY: HTML included in message * 0.5 JAM_LARGE_FONT_SIZE RAW: Body of mail contains parts with very large * font * 1.7 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding * 1.6 NULL_IN_BODY FULL: Message has NUL (ASCII 0) byte in message * 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% * [cf: 100] * 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level * above 50% * [cf: 100] * 0.9 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) * 0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe * 1.0 RDNS_DYNAMIC Delivered to internal network by host with * dynamic-looking rDNS * 0.0 HELO_MISC_IP Looking for more Dynamic IP Relays * Received: from 207-164-58-66.gci.net (207-164-58-66.gci.net [66.58.164.207])
66.58.164.214
Complaint by Aleks :
X-Spam-Status: Yes, score=16.2 required=3.0 tests=BAYES_99,BAYES_999, CK_HELO_DYNAMIC_SPLIT_IP,FSL_BULK_SIG,HELO_MISC_IP,HTML_MESSAGE, JAM_LARGE_FONT_SIZE,JAM_PHARMACY_BD,MIME_BASE64_TEXT,MIME_HTML_ONLY, MISSING_DATE,NULL_IN_BODY,RAZOR2_CF_RANGE_51_100,RAZOR2_CF_RANGE_E8_51_100, RAZOR2_CHECK,RCVD_IN_XBL,RDNS_DYNAMIC,TVD_RCVD_IP autolearn=no autolearn_force=no version=3.4.1 X-Spam-Report: * 0.4 RCVD_IN_XBL RBL: Received via a relay in Spamhaus XBL * [66.58.164.214 listed in zen.spamhaus.org] * 3.5 BAYES_99 BODY: Bayes spam probability is 99 to 100% * [score: 1.0000] * 1.5 CK_HELO_DYNAMIC_SPLIT_IP Relay HELO'd using suspicious hostname * (Split IP) * 0.0 TVD_RCVD_IP Message was received from an IP address * 0.1 JAM_PHARMACY_BD BODY: Body contains pharmacy, medication etc * 0.5 BAYES_999 BODY: Bayes spam probability is 99.9 to 100% * [score: 1.0000] * 0.7 MIME_HTML_ONLY BODY: Message only has text/html MIME parts * 0.0 HTML_MESSAGE BODY: HTML included in message * 0.5 JAM_LARGE_FONT_SIZE RAW: Body of mail contains parts with very large * font * 1.7 MIME_BASE64_TEXT RAW: Message text disguised using base64 encoding * 1.6 NULL_IN_BODY FULL: Message has NUL (ASCII 0) byte in message * 0.5 RAZOR2_CF_RANGE_51_100 Razor2 gives confidence level above 50% * [cf: 100] * 1.9 RAZOR2_CF_RANGE_E8_51_100 Razor2 gives engine 8 confidence level * above 50% * [cf: 100] * 0.9 RAZOR2_CHECK Listed in Razor2 (http://razor.sf.net/) * 0.0 FSL_BULK_SIG Bulk signature with no Unsubscribe * 1.0 RDNS_DYNAMIC Delivered to internal network by host with * dynamic-looking rDNS * 1.4 MISSING_DATE Missing Date: header * 0.0 HELO_MISC_IP Looking for more Dynamic IP Relays * Received: from 214-164-58-66.gci.net (214-164-58-66.gci.net [66.58.164.214])