Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.22.2.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.22.2.161.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012300 1800 900 604800 86400

;; Query time: 326 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 23 20:52:52 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 161.2.22.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.2.22.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.82.90.234 attackbots
2020-03-23T06:52:06.760661homeassistant sshd[383]: Invalid user hoandy from 77.82.90.234 port 50276
2020-03-23T06:52:06.772811homeassistant sshd[383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.82.90.234
2020-03-23T06:52:09.179569homeassistant sshd[383]: Failed password for invalid user hoandy from 77.82.90.234 port 50276 ssh2
...
2020-03-24 04:09:20
36.76.216.32 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 23-03-2020 15:45:09.
2020-03-24 04:01:14
190.137.22.82 attackbotsspam
Automatic report - Port Scan Attack
2020-03-24 04:11:41
130.61.108.58 attack
2020-03-23T19:32:36.701010wiz-ks3 sshd[20518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.108.58  user=root
2020-03-23T19:32:39.092369wiz-ks3 sshd[20518]: Failed password for root from 130.61.108.58 port 43155 ssh2
2020-03-23T19:32:52.554675wiz-ks3 sshd[20522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.108.58  user=root
2020-03-23T19:32:54.143044wiz-ks3 sshd[20522]: Failed password for root from 130.61.108.58 port 36576 ssh2
2020-03-23T19:33:08.438595wiz-ks3 sshd[20526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.108.58  user=root
2020-03-23T19:33:10.890100wiz-ks3 sshd[20526]: Failed password for root from 130.61.108.58 port 58232 ssh2
2020-03-23T19:33:26.035035wiz-ks3 sshd[20532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.108.58  user=root
2020-03-23T19:33:28.290847wiz-ks3 sshd[20532]: Failed password
2020-03-24 04:16:15
49.64.102.134 attackspambots
Lines containing failures of 49.64.102.134
Mar 23 16:33:11 nexus sshd[7462]: Invalid user student1 from 49.64.102.134 port 56976
Mar 23 16:33:11 nexus sshd[7462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.64.102.134
Mar 23 16:33:13 nexus sshd[7462]: Failed password for invalid user student1 from 49.64.102.134 port 56976 ssh2
Mar 23 16:33:14 nexus sshd[7462]: Received disconnect from 49.64.102.134 port 56976:11: Bye Bye [preauth]
Mar 23 16:33:14 nexus sshd[7462]: Disconnected from 49.64.102.134 port 56976 [preauth]
Mar 23 16:37:23 nexus sshd[8316]: Invalid user analytics from 49.64.102.134 port 12870
Mar 23 16:37:23 nexus sshd[8316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.64.102.134


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.64.102.134
2020-03-24 04:23:50
41.199.136.78 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 23-03-2020 15:45:09.
2020-03-24 04:00:05
152.67.67.89 attackspambots
Mar 23 13:44:48 askasleikir sshd[358083]: Failed password for invalid user stavang from 152.67.67.89 port 40900 ssh2
Mar 23 13:39:53 askasleikir sshd[357862]: Failed password for invalid user merle from 152.67.67.89 port 38028 ssh2
Mar 23 13:25:19 askasleikir sshd[357063]: Failed password for invalid user jmail from 152.67.67.89 port 57698 ssh2
2020-03-24 04:13:10
88.249.43.105 attack
Unauthorized connection attempt from IP address 88.249.43.105 on Port 445(SMB)
2020-03-24 03:51:50
186.94.73.69 attackbots
Unauthorized connection attempt from IP address 186.94.73.69 on Port 445(SMB)
2020-03-24 03:54:55
180.76.249.74 attack
(sshd) Failed SSH login from 180.76.249.74 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 20:01:43 elude sshd[11534]: Invalid user sabeurbh from 180.76.249.74 port 48398
Mar 23 20:01:45 elude sshd[11534]: Failed password for invalid user sabeurbh from 180.76.249.74 port 48398 ssh2
Mar 23 20:06:18 elude sshd[11773]: Invalid user bree from 180.76.249.74 port 56548
Mar 23 20:06:20 elude sshd[11773]: Failed password for invalid user bree from 180.76.249.74 port 56548 ssh2
Mar 23 20:09:39 elude sshd[11988]: Invalid user dixie from 180.76.249.74 port 50520
2020-03-24 04:26:19
80.82.77.189 attack
03/23/2020-16:03:20.218503 80.82.77.189 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-24 04:21:29
198.199.101.113 attack
Mar 23 13:16:51 ny01 sshd[4575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.101.113
Mar 23 13:16:52 ny01 sshd[4575]: Failed password for invalid user xiaoyu from 198.199.101.113 port 35572 ssh2
Mar 23 13:20:48 ny01 sshd[6191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.101.113
2020-03-24 03:52:16
14.145.172.111 attack
(ftpd) Failed FTP login from 14.145.172.111 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Mar 23 20:15:02 ir1 pure-ftpd: (?@14.145.172.111) [WARNING] Authentication failed for user [anonymous]
2020-03-24 04:07:58
222.186.15.166 attackspam
2020-03-23T19:58:28.390623abusebot-8.cloudsearch.cf sshd[15692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
2020-03-23T19:58:30.063607abusebot-8.cloudsearch.cf sshd[15692]: Failed password for root from 222.186.15.166 port 14767 ssh2
2020-03-23T19:58:33.144983abusebot-8.cloudsearch.cf sshd[15692]: Failed password for root from 222.186.15.166 port 14767 ssh2
2020-03-23T19:58:28.390623abusebot-8.cloudsearch.cf sshd[15692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.166  user=root
2020-03-23T19:58:30.063607abusebot-8.cloudsearch.cf sshd[15692]: Failed password for root from 222.186.15.166 port 14767 ssh2
2020-03-23T19:58:33.144983abusebot-8.cloudsearch.cf sshd[15692]: Failed password for root from 222.186.15.166 port 14767 ssh2
2020-03-23T19:58:28.390623abusebot-8.cloudsearch.cf sshd[15692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2020-03-24 04:08:35
70.113.242.156 attack
Mar 23 15:44:37 marvibiene sshd[28863]: Invalid user can from 70.113.242.156 port 44320
Mar 23 15:44:37 marvibiene sshd[28863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.113.242.156
Mar 23 15:44:37 marvibiene sshd[28863]: Invalid user can from 70.113.242.156 port 44320
Mar 23 15:44:40 marvibiene sshd[28863]: Failed password for invalid user can from 70.113.242.156 port 44320 ssh2
...
2020-03-24 04:20:55

Recently Reported IPs

210.132.211.84 89.97.204.27 80.84.162.74 40.145.187.150
127.161.142.205 24.79.31.65 9.14.53.11 121.89.57.130
143.158.9.184 200.185.107.1 206.222.188.135 95.6.84.38
162.189.16.57 207.168.192.153 173.218.239.53 118.36.44.8
10.29.245.59 223.90.74.183 178.95.252.34 91.215.89.185