Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.100.40.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.100.40.166.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 06:34:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 166.40.100.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.40.100.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.11.199 attack
Invalid user jr from 134.209.11.199 port 38052
2019-10-24 23:07:29
41.33.178.202 attackbotsspam
Oct 24 15:44:18 odroid64 sshd\[1708\]: User root from 41.33.178.202 not allowed because not listed in AllowUsers
Oct 24 15:44:18 odroid64 sshd\[1708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.33.178.202  user=root
...
2019-10-24 23:22:08
139.199.100.51 attackspambots
5x Failed Password
2019-10-24 23:05:46
13.58.201.221 attack
Invalid user admin from 13.58.201.221 port 53908
2019-10-24 23:25:54
103.221.252.46 attackbotsspam
Invalid user orlando from 103.221.252.46 port 32878
2019-10-24 23:12:43
51.79.129.236 attackbots
Oct 24 17:27:40 server sshd\[12735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip236.ip-51-79-129.net  user=root
Oct 24 17:27:43 server sshd\[12735\]: Failed password for root from 51.79.129.236 port 59953 ssh2
Oct 24 17:39:31 server sshd\[15422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip236.ip-51-79-129.net  user=root
Oct 24 17:39:33 server sshd\[15422\]: Failed password for root from 51.79.129.236 port 42859 ssh2
Oct 24 17:43:32 server sshd\[16468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip236.ip-51-79-129.net  user=root
...
2019-10-24 23:19:04
139.59.247.114 attackspambots
Invalid user vg from 139.59.247.114 port 59240
2019-10-24 23:06:23
92.46.223.98 attackbotsspam
Invalid user zimbra from 92.46.223.98 port 26788
2019-10-24 23:15:51
23.92.225.228 attack
Oct 24 16:39:06 SilenceServices sshd[3541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.92.225.228
Oct 24 16:39:08 SilenceServices sshd[3541]: Failed password for invalid user huawei from 23.92.225.228 port 45468 ssh2
Oct 24 16:43:27 SilenceServices sshd[4905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.92.225.228
2019-10-24 22:57:14
51.68.189.69 attack
Invalid user l4d from 51.68.189.69 port 41846
2019-10-24 22:54:57
112.186.77.122 attackbotsspam
Invalid user redmine from 112.186.77.122 port 45160
2019-10-24 23:10:43
34.70.124.181 attack
Invalid user admin from 34.70.124.181 port 47774
2019-10-24 23:24:45
189.108.40.2 attack
Invalid user usuario from 189.108.40.2 port 60173
2019-10-24 23:32:36
51.38.238.165 attack
Invalid user marje from 51.38.238.165 port 55600
2019-10-24 22:55:31
119.196.83.10 attackspam
Invalid user g from 119.196.83.10 port 43776
2019-10-24 23:09:24

Recently Reported IPs

159.100.43.94 159.100.195.52 159.102.247.201 159.100.201.189
159.100.19.246 159.100.83.249 159.101.135.1 159.102.165.108
159.104.176.14 159.102.3.147 159.102.180.61 159.102.154.233
159.102.254.80 159.102.146.153 159.100.41.197 159.100.59.211
159.102.133.216 159.101.184.126 159.101.142.85 159.100.253.151