Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.2.166.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.2.166.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:38:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 158.166.2.13.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 13.2.166.158.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
189.50.44.2 attackspambots
SSH login attempts with user root at 2020-03-12.
2020-03-17 06:03:55
66.154.124.50 attack
CMS (WordPress or Joomla) login attempt.
2020-03-17 06:34:56
64.227.35.131 attackbots
Invalid user zhangbo from 64.227.35.131 port 32832
2020-03-17 06:36:25
167.89.87.195 attackspambots
Mar 16 15:36:15 mail postfix/smtpd[13604]: lost connection after RCPT from o12.m.reply1.ebay.com[167.89.87.195]
2020-03-17 06:18:29
151.80.141.109 attackspambots
Unauthorized SSH login attempts
2020-03-17 06:30:09
68.127.49.11 attackspam
Mar 16 19:00:47 hosting180 sshd[11042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.127.49.11  user=root
Mar 16 19:00:49 hosting180 sshd[11042]: Failed password for root from 68.127.49.11 port 50114 ssh2
...
2020-03-17 06:31:46
189.174.230.130 attack
1433/tcp
[2020-03-16]1pkt
2020-03-17 06:01:19
106.12.71.84 attackbotsspam
[portscan] Port scan
2020-03-17 06:03:27
106.13.203.62 attack
Mar 16 19:03:01 firewall sshd[14246]: Failed password for root from 106.13.203.62 port 57414 ssh2
Mar 16 19:04:54 firewall sshd[14313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.62  user=root
Mar 16 19:04:55 firewall sshd[14313]: Failed password for root from 106.13.203.62 port 34502 ssh2
...
2020-03-17 06:06:33
111.229.103.67 attackbots
Mar 16 21:40:11 master sshd[24416]: Failed password for root from 111.229.103.67 port 42610 ssh2
2020-03-17 06:14:31
129.204.87.153 attack
Invalid user saed from 129.204.87.153 port 56361
2020-03-17 06:12:48
14.231.145.190 attackbots
445/tcp
[2020-03-16]1pkt
2020-03-17 06:42:24
191.184.28.67 attackspambots
61672/udp
[2020-03-16]1pkt
2020-03-17 06:29:37
5.153.178.184 attackbotsspam
9090/tcp
[2020-03-16]1pkt
2020-03-17 06:08:19
160.238.75.206 attackspam
445/tcp
[2020-03-16]1pkt
2020-03-17 06:28:37

Recently Reported IPs

17.50.85.66 189.50.50.228 189.177.54.2 220.197.59.107
198.126.8.74 226.183.52.76 174.237.153.151 229.213.125.226
86.226.94.2 117.116.7.185 223.217.74.146 190.33.26.249
15.241.174.175 216.172.30.231 61.191.68.163 229.17.81.14
154.97.221.134 250.245.165.129 20.173.208.73 45.136.233.147