Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.154.104.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.154.104.164.		IN	A

;; AUTHORITY SECTION:
.			256	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072201 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 03:59:44 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 164.104.154.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.104.154.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.196.110.170 attackspambots
Aug 26 00:07:27 aiointranet sshd\[26071\]: Invalid user reagan from 5.196.110.170
Aug 26 00:07:27 aiointranet sshd\[26071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip170.ip-5-196-110.eu
Aug 26 00:07:29 aiointranet sshd\[26071\]: Failed password for invalid user reagan from 5.196.110.170 port 35218 ssh2
Aug 26 00:12:55 aiointranet sshd\[26609\]: Invalid user design from 5.196.110.170
Aug 26 00:12:55 aiointranet sshd\[26609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip170.ip-5-196-110.eu
2019-08-26 18:27:54
200.61.187.49 attack
19/8/26@00:41:58: FAIL: Alarm-Intrusion address from=200.61.187.49
...
2019-08-26 19:12:43
45.116.232.40 attackbotsspam
Attempting to hack into Facebook and other social media accounts
2019-08-26 18:44:12
185.176.27.118 attackspam
08/26/2019-07:05:53.223669 185.176.27.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-26 19:23:34
198.200.124.197 attackbots
Aug 26 13:08:05 plex sshd[20243]: Invalid user mlsmith from 198.200.124.197 port 48872
2019-08-26 19:14:37
101.89.150.214 attackspam
Aug 26 03:04:24 xtremcommunity sshd\[9318\]: Invalid user gaetan from 101.89.150.214 port 60105
Aug 26 03:04:24 xtremcommunity sshd\[9318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.150.214
Aug 26 03:04:26 xtremcommunity sshd\[9318\]: Failed password for invalid user gaetan from 101.89.150.214 port 60105 ssh2
Aug 26 03:09:57 xtremcommunity sshd\[9646\]: Invalid user rust from 101.89.150.214 port 51256
Aug 26 03:09:57 xtremcommunity sshd\[9646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.150.214
...
2019-08-26 18:41:43
148.70.104.232 attackspam
Aug 26 00:25:43 TORMINT sshd\[16548\]: Invalid user ncim from 148.70.104.232
Aug 26 00:25:43 TORMINT sshd\[16548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.104.232
Aug 26 00:25:44 TORMINT sshd\[16548\]: Failed password for invalid user ncim from 148.70.104.232 port 47360 ssh2
...
2019-08-26 18:47:37
222.124.16.227 attackspam
Aug 26 12:24:09 ArkNodeAT sshd\[5903\]: Invalid user gideon from 222.124.16.227
Aug 26 12:24:09 ArkNodeAT sshd\[5903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
Aug 26 12:24:11 ArkNodeAT sshd\[5903\]: Failed password for invalid user gideon from 222.124.16.227 port 44328 ssh2
2019-08-26 18:39:29
106.51.143.178 attackbotsspam
Aug 26 00:48:50 kapalua sshd\[17215\]: Invalid user git from 106.51.143.178
Aug 26 00:48:50 kapalua sshd\[17215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
Aug 26 00:48:52 kapalua sshd\[17215\]: Failed password for invalid user git from 106.51.143.178 port 40572 ssh2
Aug 26 00:53:33 kapalua sshd\[17579\]: Invalid user telkom from 106.51.143.178
Aug 26 00:53:33 kapalua sshd\[17579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
2019-08-26 19:07:43
91.121.148.203 attack
Aug 26 05:08:21 mxgate1 postfix/postscreen[8868]: CONNECT from [91.121.148.203]:35772 to [176.31.12.44]:25
Aug 26 05:08:21 mxgate1 postfix/dnsblog[8870]: addr 91.121.148.203 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 26 05:08:21 mxgate1 postfix/dnsblog[8872]: addr 91.121.148.203 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 26 05:08:21 mxgate1 postfix/dnsblog[8871]: addr 91.121.148.203 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 26 05:08:21 mxgate1 postfix/dnsblog[8869]: addr 91.121.148.203 listed by domain bl.spamcop.net as 127.0.0.2
Aug 26 05:08:27 mxgate1 postfix/postscreen[8868]: DNSBL rank 5 for [91.121.148.203]:35772
Aug x@x
Aug 26 05:08:27 mxgate1 postfix/postscreen[8868]: HANGUP after 0.11 from [91.121.148.203]:35772 in tests after SMTP handshake
Aug 26 05:08:27 mxgate1 postfix/postscreen[8868]: DISCONNECT [91.121.148.203]:35772


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.121.148.203
2019-08-26 18:48:47
185.244.25.119 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-26 18:56:34
125.227.236.60 attackspambots
Aug 26 09:04:42 debian sshd\[31737\]: Invalid user kmem from 125.227.236.60 port 47796
Aug 26 09:04:42 debian sshd\[31737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.236.60
...
2019-08-26 19:05:34
203.195.243.146 attackspam
Aug 26 09:54:23 server sshd[50711]: Failed password for invalid user ubuntu from 203.195.243.146 port 47044 ssh2
Aug 26 09:57:04 server sshd[51450]: Failed password for root from 203.195.243.146 port 43038 ssh2
Aug 26 09:59:30 server sshd[51987]: Failed password for invalid user mo from 203.195.243.146 port 36646 ssh2
2019-08-26 18:47:03
219.154.142.187 attack
Aug 26 05:21:30 nginx sshd[55364]: error: maximum authentication attempts exceeded for root from 219.154.142.187 port 39228 ssh2 [preauth]
Aug 26 05:21:30 nginx sshd[55364]: Disconnecting: Too many authentication failures [preauth]
2019-08-26 19:16:27
206.189.108.59 attackspam
Aug 26 09:25:01 tuxlinux sshd[14585]: Invalid user duckie from 206.189.108.59 port 48114
Aug 26 09:25:01 tuxlinux sshd[14585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59 
Aug 26 09:25:01 tuxlinux sshd[14585]: Invalid user duckie from 206.189.108.59 port 48114
Aug 26 09:25:01 tuxlinux sshd[14585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59 
Aug 26 09:25:01 tuxlinux sshd[14585]: Invalid user duckie from 206.189.108.59 port 48114
Aug 26 09:25:01 tuxlinux sshd[14585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.108.59 
Aug 26 09:25:03 tuxlinux sshd[14585]: Failed password for invalid user duckie from 206.189.108.59 port 48114 ssh2
...
2019-08-26 18:37:04

Recently Reported IPs

159.153.237.64 159.153.45.139 159.152.35.191 159.152.135.128
159.151.231.32 159.153.0.105 159.152.176.37 159.152.148.148
159.152.27.45 159.152.141.165 159.151.198.14 159.151.160.134
159.152.39.23 159.151.246.136 159.152.66.230 38.6.64.54
159.151.28.108 159.151.244.194 159.152.216.141 159.152.108.40