Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.22.180.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.22.180.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120602 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 10:27:35 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 101.180.22.159.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 101.180.22.159.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
192.241.194.171 attackspam
2323/tcp 8118/tcp 5631/tcp...
[2020-03-01/05-01]9pkt,8pt.(tcp),1pt.(udp)
2020-05-01 21:57:55
41.210.25.173 attackbotsspam
May  1 13:38:22 xeon postfix/smtpd[9129]: warning: unknown[41.210.25.173]: SASL PLAIN authentication failed: authentication failure
2020-05-01 21:36:08
31.195.76.130 attack
W 31101,/var/log/nginx/access.log,-,-
2020-05-01 21:38:06
86.97.222.16 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 21:20:43
103.80.55.19 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-01 21:47:54
41.90.14.199 attack
Dovecot Invalid User Login Attempt.
2020-05-01 21:43:13
92.118.160.1 attackbots
Port scan(s) denied
2020-05-01 21:30:25
193.70.87.20 attack
SSH invalid-user multiple login attempts
2020-05-01 21:25:40
80.82.70.118 attack
05/01/2020-09:25:49.095868 80.82.70.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-01 21:27:59
194.26.29.116 attackbotsspam
51683/tcp 31071/tcp 51751/tcp...
[2020-03-29/04-29]13007pkt,6067pt.(tcp)
2020-05-01 21:54:35
45.13.93.90 attack
Port scan(s) denied
2020-05-01 21:36:54
59.90.47.72 attack
2020-05-01T06:42:21.323388linuxbox-skyline sshd[94652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.90.47.72  user=root
2020-05-01T06:42:22.782148linuxbox-skyline sshd[94652]: Failed password for root from 59.90.47.72 port 45888 ssh2
...
2020-05-01 21:33:32
194.152.206.12 attackbotsspam
Apr 29 17:34:34 mail sshd[4488]: Failed password for root from 194.152.206.12 port 41090 ssh2
...
2020-05-01 21:25:14
161.35.23.174 attack
Unknown connection
2020-05-01 21:51:16
119.28.116.166 attack
Invalid user edoardo from 119.28.116.166 port 45454
2020-05-01 22:00:25

Recently Reported IPs

213.55.109.110 10.165.1.115 141.139.150.152 34.45.186.242
3.14.176.165 114.15.186.63 76.92.69.198 49.78.240.111
14.70.126.192 108.154.175.17 25.235.204.34 84.94.82.160
239.111.57.37 171.244.134.208 7.69.178.203 190.219.94.165
160.151.33.38 59.227.19.237 204.203.239.134 156.160.43.162