Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Innsbruck

Region: Tyrol

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Innsbruck

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.232.159.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42556
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.232.159.164.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 06 02:31:43 CST 2019
;; MSG SIZE  rcvd: 119
Host info
164.159.232.138.in-addr.arpa domain name pointer re164-c130.uibk.ac.at.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
164.159.232.138.in-addr.arpa	name = re164-c130.uibk.ac.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.157 attack
Port Scan
...
2020-10-04 06:46:37
37.187.181.182 attack
Fail2Ban Ban Triggered
2020-10-04 06:44:08
192.35.168.225 attackspam
Fail2Ban Ban Triggered
2020-10-04 06:49:01
212.64.35.193 attackspam
Invalid user tomas from 212.64.35.193 port 32874
2020-10-04 06:41:58
186.19.9.78 attackbots
02.10.2020 22:39:24 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-10-04 06:48:25
157.231.113.130 attackbots
SSH Invalid Login
2020-10-04 06:49:32
138.201.135.92 attackspambots
Email spam message
2020-10-04 07:09:02
106.54.203.54 attackspam
Oct  3 17:33:13 buvik sshd[10402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.203.54
Oct  3 17:33:15 buvik sshd[10402]: Failed password for invalid user site from 106.54.203.54 port 34594 ssh2
Oct  3 17:39:02 buvik sshd[11161]: Invalid user gerencia from 106.54.203.54
...
2020-10-04 07:02:11
118.186.203.151 attack
Unauthorised access (Oct  2) SRC=118.186.203.151 LEN=40 TTL=231 ID=12325 TCP DPT=1433 WINDOW=1024 SYN
2020-10-04 06:57:11
79.135.73.141 attack
SSH Invalid Login
2020-10-04 07:12:44
103.80.210.103 attackbotsspam
445/tcp 445/tcp 445/tcp
[2020-08-17/10-02]3pkt
2020-10-04 06:58:08
106.13.107.196 attackspambots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.107.196 
Failed password for invalid user jairo from 106.13.107.196 port 53292 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.107.196
2020-10-04 06:46:20
134.175.19.39 attack
Oct  3 18:42:46 ourumov-web sshd\[6294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.19.39  user=root
Oct  3 18:42:48 ourumov-web sshd\[6294\]: Failed password for root from 134.175.19.39 port 45746 ssh2
Oct  3 18:55:46 ourumov-web sshd\[7064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.19.39  user=root
...
2020-10-04 07:03:11
182.253.191.122 attackbotsspam
k+ssh-bruteforce
2020-10-04 07:11:33
77.94.137.91 attackbotsspam
DATE:2020-10-03 10:54:49, IP:77.94.137.91, PORT:ssh SSH brute force auth (docker-dc)
2020-10-04 07:14:15

Recently Reported IPs

117.139.146.144 110.163.110.86 236.16.38.13 127.240.122.186
213.163.161.138 22.20.247.0 195.199.197.147 237.78.159.224
232.199.166.65 232.38.138.221 36.142.171.84 114.18.225.51
207.244.168.228 231.235.61.66 99.17.119.214 0.58.42.52
162.246.24.122 68.200.52.78 80.76.240.168 193.19.51.190