Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.164.142.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.164.142.171.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 13:41:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
171.142.164.1.in-addr.arpa domain name pointer 1-164-142-171.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
171.142.164.1.in-addr.arpa	name = 1-164-142-171.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
209.97.134.82 attackspambots
Apr  3 05:51:56 ns381471 sshd[16109]: Failed password for root from 209.97.134.82 port 45348 ssh2
2020-04-03 12:02:34
118.101.194.159 attack
Apr  3 05:41:43 ns382633 sshd\[27506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.194.159  user=root
Apr  3 05:41:45 ns382633 sshd\[27506\]: Failed password for root from 118.101.194.159 port 60606 ssh2
Apr  3 05:52:13 ns382633 sshd\[29488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.194.159  user=root
Apr  3 05:52:15 ns382633 sshd\[29488\]: Failed password for root from 118.101.194.159 port 51788 ssh2
Apr  3 05:56:35 ns382633 sshd\[30357\]: Invalid user iy from 118.101.194.159 port 45294
Apr  3 05:56:35 ns382633 sshd\[30357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.194.159
2020-04-03 12:27:45
118.89.219.116 attack
Apr  2 20:42:50 pixelmemory sshd[903]: Failed password for root from 118.89.219.116 port 56710 ssh2
Apr  2 20:53:10 pixelmemory sshd[3138]: Failed password for root from 118.89.219.116 port 52248 ssh2
...
2020-04-03 12:00:46
122.225.105.173 attack
Apr  3 09:09:40 gw1 sshd[25142]: Failed password for root from 122.225.105.173 port 59024 ssh2
Apr  3 09:14:20 gw1 sshd[25213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.225.105.173
...
2020-04-03 12:28:59
129.211.94.30 attackspam
(sshd) Failed SSH login from 129.211.94.30 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 05:56:51 ubnt-55d23 sshd[22999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.94.30  user=root
Apr  3 05:56:53 ubnt-55d23 sshd[22999]: Failed password for root from 129.211.94.30 port 60860 ssh2
2020-04-03 12:07:30
202.5.18.84 attackbotsspam
2020-04-03T01:49:29.893698randservbullet-proofcloud-66.localdomain sshd[5078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.5.18.84  user=root
2020-04-03T01:49:32.025592randservbullet-proofcloud-66.localdomain sshd[5078]: Failed password for root from 202.5.18.84 port 50391 ssh2
2020-04-03T01:59:44.923891randservbullet-proofcloud-66.localdomain sshd[5155]: Invalid user ganesha from 202.5.18.84 port 28594
...
2020-04-03 11:03:45
2002:b9ea:d8ce::b9ea:d8ce attack
Apr  3 05:24:37 web01.agentur-b-2.de postfix/smtpd[479734]: warning: unknown[2002:b9ea:d8ce::b9ea:d8ce]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  3 05:24:37 web01.agentur-b-2.de postfix/smtpd[479734]: lost connection after AUTH from unknown[2002:b9ea:d8ce::b9ea:d8ce]
Apr  3 05:26:49 web01.agentur-b-2.de postfix/smtpd[480876]: warning: unknown[2002:b9ea:d8ce::b9ea:d8ce]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  3 05:26:49 web01.agentur-b-2.de postfix/smtpd[480876]: lost connection after AUTH from unknown[2002:b9ea:d8ce::b9ea:d8ce]
Apr  3 05:32:45 web01.agentur-b-2.de postfix/smtpd[480876]: warning: unknown[2002:b9ea:d8ce::b9ea:d8ce]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  3 05:32:45 web01.agentur-b-2.de postfix/smtpd[480876]: lost connection after AUTH from unknown[2002:b9ea:d8ce::b9ea:d8ce]
2020-04-03 12:44:16
89.46.86.65 attack
Apr  3 05:47:28 host01 sshd[24055]: Failed password for root from 89.46.86.65 port 40530 ssh2
Apr  3 05:52:17 host01 sshd[24954]: Failed password for root from 89.46.86.65 port 51814 ssh2
Apr  3 05:56:51 host01 sshd[25740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.86.65 
...
2020-04-03 12:10:52
218.92.0.148 attackspam
Brute-force attempt banned
2020-04-03 12:02:17
92.118.38.66 attackbots
2020-04-03T06:05:15.301102www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-03T06:06:01.453409www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-03T06:06:43.139953www postfix/smtpd[2041]: warning: unknown[92.118.38.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-03 12:10:29
118.71.206.119 attackspambots
Unauthorised access (Apr  3) SRC=118.71.206.119 LEN=52 TTL=107 ID=28460 DF TCP DPT=1433 WINDOW=8192 SYN
2020-04-03 12:12:32
92.63.194.25 attack
Brute-force attempt banned
2020-04-03 12:17:03
36.155.114.151 attackbotsspam
Apr  3 00:08:10 NPSTNNYC01T sshd[31555]: Failed password for root from 36.155.114.151 port 44632 ssh2
Apr  3 00:12:00 NPSTNNYC01T sshd[32150]: Failed password for root from 36.155.114.151 port 35835 ssh2
...
2020-04-03 12:18:17
51.91.108.15 attackbots
detected by Fail2Ban
2020-04-03 12:11:24
208.186.112.103 attackbots
2020-04-03 H=substance.onvacationnow.com \(substance.cbtbtest.com\) \[208.186.112.103\] F=\ rejected RCPT \: Mail not accepted. 208.186.112.103 is listed at a DNSBL.
2020-04-03 H=substance.onvacationnow.com \(substance.cbtbtest.com\) \[208.186.112.103\] F=\ rejected RCPT \: Mail not accepted. 208.186.112.103 is listed at a DNSBL.
2020-04-03 H=substance.onvacationnow.com \(substance.cbtbtest.com\) \[208.186.112.103\] F=\ rejected RCPT \: Mail not accepted. 208.186.112.103 is listed at a DNSBL.
2020-04-03 12:37:58

Recently Reported IPs

1.164.141.62 1.164.142.234 1.164.142.87 1.164.142.99
112.30.117.132 1.164.143.141 1.164.143.149 1.164.143.44
1.164.143.50 67.24.147.254 1.164.144.116 1.164.144.173
1.164.144.204 1.164.144.21 1.164.145.160 1.164.146.162
1.164.146.228 1.164.147.130 1.164.147.150 1.164.147.210