Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Tanzania

Internet Service Provider: Airtel

Hostname: unknown

Organization: airtel-tz-as

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.157.164.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54122
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;156.157.164.105.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 19 01:51:26 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 105.164.157.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 105.164.157.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.3.100.45 attackbotsspam
SMTP Fraud Orders
2019-06-30 12:58:43
180.241.248.44 attackspam
445/tcp
[2019-06-30]1pkt
2019-06-30 12:46:11
35.205.43.108 attackspambots
22/tcp
[2019-06-30]1pkt
2019-06-30 13:26:48
14.244.16.171 attack
Jun 30 05:44:41 MK-Soft-Root2 sshd\[10473\]: Invalid user admin from 14.244.16.171 port 48983
Jun 30 05:44:41 MK-Soft-Root2 sshd\[10473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.244.16.171
Jun 30 05:44:43 MK-Soft-Root2 sshd\[10473\]: Failed password for invalid user admin from 14.244.16.171 port 48983 ssh2
...
2019-06-30 13:37:36
138.68.178.64 attack
Invalid user teamspeak3 from 138.68.178.64 port 60674
2019-06-30 13:07:15
34.232.62.57 attackspambots
Port scan on 1 port(s): 53
2019-06-30 13:26:04
81.159.199.72 attack
Jun 30 06:06:31 dev sshd\[23051\]: Invalid user mediatomb from 81.159.199.72 port 41338
Jun 30 06:06:31 dev sshd\[23051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.159.199.72
...
2019-06-30 12:48:20
60.211.83.226 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 12:52:23
137.226.113.9 attackbots
From CCTV User Interface Log
...::ffff:137.226.113.9 - - [30/Jun/2019:00:47:33 +0000] "-" 400 179
...
2019-06-30 13:21:03
60.250.104.222 attack
SMB Server BruteForce Attack
2019-06-30 13:07:48
139.199.122.210 attackbots
SSH invalid-user multiple login try
2019-06-30 13:25:13
73.8.91.33 attackbots
Jun 30 05:46:09 nextcloud sshd\[30384\]: Invalid user president from 73.8.91.33
Jun 30 05:46:09 nextcloud sshd\[30384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.8.91.33
Jun 30 05:46:11 nextcloud sshd\[30384\]: Failed password for invalid user president from 73.8.91.33 port 47182 ssh2
...
2019-06-30 12:45:39
10.187.237.29 attackspambots
Attempted to connect 3 times to port 23 TCP
2019-06-30 13:14:06
88.248.15.4 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 13:22:35
36.229.13.219 attack
445/tcp 445/tcp
[2019-06-30]2pkt
2019-06-30 13:18:33

Recently Reported IPs

88.249.98.35 109.49.167.74 166.124.96.219 154.101.48.182
34.68.53.63 69.140.74.28 182.113.117.141 71.9.34.108
122.86.186.22 151.249.103.15 2a02:8108:8200:d60:e9da:8ccf:6eb7:84fc 65.4.25.195
88.249.59.151 95.114.42.23 167.251.214.6 138.68.190.242
50.145.105.212 20.184.215.160 93.129.52.249 139.94.45.145