Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.2.166.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 427
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.2.166.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:38:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 158.166.2.13.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 13.2.166.158.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.40.50.116 attackspam
Automatic report - Banned IP Access
2020-02-15 13:07:56
171.96.30.14 attack
Unauthorised access (Feb 15) SRC=171.96.30.14 LEN=44 PREC=0x20 TTL=49 ID=14524 TCP DPT=23 WINDOW=9563 SYN 
Unauthorised access (Feb 14) SRC=171.96.30.14 LEN=44 PREC=0x20 TTL=49 ID=34392 TCP DPT=23 WINDOW=57644 SYN
2020-02-15 10:54:39
222.124.77.238 attackbots
Unauthorized connection attempt detected from IP address 222.124.77.238 to port 445
2020-02-15 10:59:25
106.127.9.116 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-15 10:58:05
111.35.34.183 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 13:11:45
123.21.12.132 attack
Mail system brute-force attack
2020-02-15 11:09:16
113.66.197.247 attackbotsspam
2020-02-14 23:03:09 H=(gdurz.cc) [113.66.197.247]:40364 I=[10.100.18.25]:25 sender verify fail for : Unrouteable address
2020-02-14 x@x
2020-02-14 23:03:10 unexpected disconnection while reading SMTP command from (gdurz.cc) [113.66.197.247]:40364 I=[10.100.18.25]:25

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.66.197.247
2020-02-15 10:56:09
1.20.230.245 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:44:00
178.128.220.8 attackspam
Automatic report - XMLRPC Attack
2020-02-15 10:50:41
151.80.60.151 attackbots
Feb 14 23:05:01 Ubuntu-1404-trusty-64-minimal sshd\[32112\]: Invalid user user from 151.80.60.151
Feb 14 23:05:01 Ubuntu-1404-trusty-64-minimal sshd\[32112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.60.151
Feb 14 23:05:03 Ubuntu-1404-trusty-64-minimal sshd\[32112\]: Failed password for invalid user user from 151.80.60.151 port 50320 ssh2
Feb 14 23:21:29 Ubuntu-1404-trusty-64-minimal sshd\[6835\]: Invalid user roumegoux from 151.80.60.151
Feb 14 23:21:29 Ubuntu-1404-trusty-64-minimal sshd\[6835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.60.151
2020-02-15 10:42:59
92.118.27.202 attackbotsspam
Brute-Force reported by Fail2Ban
2020-02-15 10:44:56
1.20.230.110 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 10:49:36
1.20.205.149 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 11:09:50
91.212.150.151 attackspambots
fraudulent SSH attempt
2020-02-15 10:50:57
163.172.50.60 attackbotsspam
Feb 15 03:36:23 legacy sshd[22097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.60
Feb 15 03:36:25 legacy sshd[22097]: Failed password for invalid user ts3 from 163.172.50.60 port 45134 ssh2
Feb 15 03:39:23 legacy sshd[22245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.60
...
2020-02-15 10:42:31

Recently Reported IPs

17.50.85.66 189.50.50.228 189.177.54.2 220.197.59.107
198.126.8.74 226.183.52.76 174.237.153.151 229.213.125.226
86.226.94.2 117.116.7.185 223.217.74.146 190.33.26.249
15.241.174.175 216.172.30.231 61.191.68.163 229.17.81.14
154.97.221.134 250.245.165.129 20.173.208.73 45.136.233.147