Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.213.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.213.164.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:20:37 CST 2022
;; MSG SIZE  rcvd: 104
Host info
164.213.1.1.in-addr.arpa domain name pointer node-gx0.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.213.1.1.in-addr.arpa	name = node-gx0.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.200.66.164 attackbotsspam
Invalid user russ from 42.200.66.164 port 40994
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.66.164
Failed password for invalid user russ from 42.200.66.164 port 40994 ssh2
Invalid user keya from 42.200.66.164 port 36824
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.66.164
2019-08-11 07:02:50
213.32.23.169 attack
SSH-BruteForce
2019-08-11 06:47:31
223.80.102.29 attackbotsspam
Mar  4 11:37:59 motanud sshd\[20561\]: Invalid user sysadmin from 223.80.102.29 port 27655
Mar  4 11:37:59 motanud sshd\[20561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.80.102.29
Mar  4 11:38:02 motanud sshd\[20561\]: Failed password for invalid user sysadmin from 223.80.102.29 port 27655 ssh2
2019-08-11 06:37:41
107.158.223.166 attack
Looking for resource vulnerabilities
2019-08-11 07:16:51
218.22.47.130 attackspambots
SSH-BruteForce
2019-08-11 06:43:35
213.136.78.224 attackbots
SSH-BruteForce
2019-08-11 06:48:10
190.5.241.138 attackspambots
Aug 10 21:54:58 raspberrypi sshd\[16668\]: Failed password for root from 190.5.241.138 port 43796 ssh2Aug 10 22:34:22 raspberrypi sshd\[17503\]: Invalid user admin from 190.5.241.138Aug 10 22:34:25 raspberrypi sshd\[17503\]: Failed password for invalid user admin from 190.5.241.138 port 49274 ssh2
...
2019-08-11 06:48:57
218.92.0.155 attack
SSH-BruteForce
2019-08-11 06:40:47
211.240.105.132 attackbots
SSH-BruteForce
2019-08-11 06:49:28
93.62.100.242 attackbotsspam
Aug 11 00:33:55 MK-Soft-Root2 sshd\[4782\]: Invalid user biblioteca from 93.62.100.242 port 51855
Aug 11 00:33:55 MK-Soft-Root2 sshd\[4782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.62.100.242
Aug 11 00:33:57 MK-Soft-Root2 sshd\[4782\]: Failed password for invalid user biblioteca from 93.62.100.242 port 51855 ssh2
...
2019-08-11 07:01:30
35.185.151.132 attackspam
SSH-BruteForce
2019-08-11 06:38:14
210.227.113.18 attackspam
Aug 10 22:52:31 MK-Soft-VM7 sshd\[2761\]: Invalid user nm from 210.227.113.18 port 56072
Aug 10 22:52:31 MK-Soft-VM7 sshd\[2761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18
Aug 10 22:52:33 MK-Soft-VM7 sshd\[2761\]: Failed password for invalid user nm from 210.227.113.18 port 56072 ssh2
...
2019-08-11 06:54:27
223.171.37.178 attackspam
Jan  6 16:29:22 motanud sshd\[26555\]: Invalid user deployer from 223.171.37.178 port 35366
Jan  6 16:29:22 motanud sshd\[26555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.37.178
Jan  6 16:29:24 motanud sshd\[26555\]: Failed password for invalid user deployer from 223.171.37.178 port 35366 ssh2
2019-08-11 07:13:29
77.83.174.140 attack
08/10/2019-18:59:51.576926 77.83.174.140 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-11 06:59:56
106.12.178.127 attack
Aug 10 23:34:59 debian sshd\[12698\]: Invalid user sistemas from 106.12.178.127 port 45506
Aug 10 23:34:59 debian sshd\[12698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.127
...
2019-08-11 06:39:11

Recently Reported IPs

1.1.213.118 1.1.213.162 1.1.213.186 1.1.213.226
1.1.213.15 1.1.213.245 1.1.213.30 1.1.213.51
1.54.212.171 1.1.213.65 1.1.213.57 1.1.213.52
1.1.213.90 1.1.214.117 1.1.214.149 1.1.214.151
1.1.213.55 1.1.214.155 1.1.214.16 1.1.214.152