Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stuttgart

Region: Baden-Württemberg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.180.170.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18665
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.180.170.169.		IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030101 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 12:28:11 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 169.170.180.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.170.180.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
108.61.222.250 attackspam
Apr  8 05:55:20 debian-2gb-nbg1-2 kernel: \[8577139.252887\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=108.61.222.250 DST=195.201.40.59 LEN=72 TOS=0x00 PREC=0x00 TTL=48 ID=46265 DF PROTO=UDP SPT=56747 DPT=53 LEN=52 
Apr  8 05:55:20 debian-2gb-nbg1-2 kernel: \[8577139.277470\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=108.61.222.250 DST=195.201.40.59 LEN=64 TOS=0x00 PREC=0x00 TTL=49 ID=46264 DF PROTO=UDP SPT=51230 DPT=53 LEN=44 
Apr  8 05:55:20 debian-2gb-nbg1-2 kernel: \[8577139.293924\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=108.61.222.250 DST=195.201.40.59 LEN=59 TOS=0x00 PREC=0x00 TTL=49 ID=46262 DF PROTO=UDP SPT=1551 DPT=53 LEN=39 
Apr  8 05:55:20 debian-2gb-nbg1-2 kernel: \[8577139.306640\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=108.61.222.250 DST=195.201.40.59 LEN=61 TOS=0x00 PREC=0x00 TTL=49 ID=46263 DF PROTO=UDP SPT=58198 DPT=53 LEN=41
2020-04-08 16:50:50
74.219.255.234 attack
20/4/7@23:55:29: FAIL: Alarm-Intrusion address from=74.219.255.234
...
2020-04-08 16:44:31
203.159.249.215 attackspam
Apr  8 10:41:57 lock-38 sshd[733037]: Invalid user user from 203.159.249.215 port 37250
Apr  8 10:41:57 lock-38 sshd[733037]: Failed password for invalid user user from 203.159.249.215 port 37250 ssh2
Apr  8 10:43:15 lock-38 sshd[733084]: Invalid user postgres from 203.159.249.215 port 51256
Apr  8 10:43:15 lock-38 sshd[733084]: Invalid user postgres from 203.159.249.215 port 51256
Apr  8 10:43:15 lock-38 sshd[733084]: Failed password for invalid user postgres from 203.159.249.215 port 51256 ssh2
...
2020-04-08 16:44:02
39.100.43.17 attack
Unauthorized connection attempt detected from IP address 39.100.43.17 to port 8081
2020-04-08 16:58:46
163.179.126.39 attack
leo_www
2020-04-08 17:09:38
195.56.77.209 attackspambots
<6 unauthorized SSH connections
2020-04-08 17:06:37
27.73.18.72 attackspambots
Unauthorized connection attempt detected from IP address 27.73.18.72 to port 445
2020-04-08 17:16:04
189.213.27.104 attackbots
DrayTek CVE
2020-04-08 16:53:09
192.241.144.235 attackspambots
Apr  8 07:57:37 odroid64 sshd\[20327\]: Invalid user andrew from 192.241.144.235
Apr  8 07:57:37 odroid64 sshd\[20327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.144.235
...
2020-04-08 16:54:20
49.88.112.67 attackspambots
2020-04-07 09:37:05 -> 2020-04-07 12:04:13 : 589 attempts authlog.
2020-04-08 16:48:01
123.51.222.157 attackbotsspam
$f2bV_matches
2020-04-08 16:50:20
120.52.120.166 attack
Apr  8 03:54:59 localhost sshd\[10759\]: Invalid user informix from 120.52.120.166 port 45118
Apr  8 03:54:59 localhost sshd\[10759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.166
Apr  8 03:55:01 localhost sshd\[10759\]: Failed password for invalid user informix from 120.52.120.166 port 45118 ssh2
...
2020-04-08 17:04:54
218.92.0.201 attackbotsspam
Apr  8 05:54:49 [HOSTNAME] sshd[22255]: User **removed** from 218.92.0.201 not allowed because not listed in AllowUsers
Apr  8 05:54:49 [HOSTNAME] sshd[22255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.201  user=**removed**
Apr  8 05:54:51 [HOSTNAME] sshd[22255]: Failed password for invalid user **removed** from 218.92.0.201 port 29922 ssh2
...
2020-04-08 17:13:22
116.196.101.168 attackbotsspam
Apr  8 09:42:58 DAAP sshd[8161]: Invalid user lobo from 116.196.101.168 port 54770
Apr  8 09:42:58 DAAP sshd[8161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.101.168
Apr  8 09:42:58 DAAP sshd[8161]: Invalid user lobo from 116.196.101.168 port 54770
Apr  8 09:43:00 DAAP sshd[8161]: Failed password for invalid user lobo from 116.196.101.168 port 54770 ssh2
Apr  8 09:52:56 DAAP sshd[8281]: Invalid user check from 116.196.101.168 port 40362
...
2020-04-08 17:07:18
42.119.27.185 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 08-04-2020 04:55:09.
2020-04-08 16:59:36

Recently Reported IPs

111.58.232.117 115.134.223.220 152.146.163.35 82.171.67.199
132.194.218.59 104.83.212.45 66.240.5.203 180.118.118.235
46.132.221.94 153.228.17.0 146.17.149.96 16.53.215.186
137.194.251.45 90.106.212.35 80.87.153.10 124.170.229.219
122.54.134.176 216.19.175.12 169.198.183.225 164.127.10.11