Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.221.164.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.221.164.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012001 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 12:32:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 99.164.221.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.164.221.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.135.179 attackbots
slow and persistent scanner
2019-10-15 05:42:40
3.16.37.226 attackbots
$f2bV_matches
2019-10-15 05:47:27
180.166.30.54 attack
10/14/2019-21:56:13.368665 180.166.30.54 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-15 06:05:06
79.135.40.231 attackspambots
$f2bV_matches_ltvn
2019-10-15 05:41:58
180.76.57.7 attackspambots
$f2bV_matches_ltvn
2019-10-15 06:08:41
46.105.132.32 attackbots
Port Scan: TCP/9200
2019-10-15 06:16:51
121.202.9.250 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/121.202.9.250/ 
 HK - 1H : (25)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : HK 
 NAME ASN : ASN17924 
 
 IP : 121.202.9.250 
 
 CIDR : 121.202.0.0/18 
 
 PREFIX COUNT : 113 
 
 UNIQUE IP COUNT : 464896 
 
 
 WYKRYTE ATAKI Z ASN17924 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-14 21:56:49 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 05:46:23
122.114.10.38 attack
Oct 14 12:00:43 kapalua sshd\[9186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.10.38  user=root
Oct 14 12:00:46 kapalua sshd\[9186\]: Failed password for root from 122.114.10.38 port 1582 ssh2
Oct 14 12:00:48 kapalua sshd\[9186\]: Failed password for root from 122.114.10.38 port 1582 ssh2
Oct 14 12:01:19 kapalua sshd\[9244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.10.38  user=root
Oct 14 12:01:21 kapalua sshd\[9244\]: Failed password for root from 122.114.10.38 port 4855 ssh2
2019-10-15 06:11:29
222.186.180.8 attack
Oct 15 00:07:58 srv206 sshd[29604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Oct 15 00:08:00 srv206 sshd[29604]: Failed password for root from 222.186.180.8 port 16298 ssh2
...
2019-10-15 06:08:14
128.199.138.31 attackbotsspam
SSH bruteforce
2019-10-15 05:52:11
51.83.33.156 attackbotsspam
Invalid user kawa from 51.83.33.156 port 41650
2019-10-15 06:17:25
98.213.58.68 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-10-15 06:01:23
23.94.205.209 attack
Oct 14 11:20:35 php1 sshd\[17726\]: Invalid user zysjk\) from 23.94.205.209
Oct 14 11:20:35 php1 sshd\[17726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
Oct 14 11:20:37 php1 sshd\[17726\]: Failed password for invalid user zysjk\) from 23.94.205.209 port 33400 ssh2
Oct 14 11:24:13 php1 sshd\[18027\]: Invalid user sa@20161115 from 23.94.205.209
Oct 14 11:24:13 php1 sshd\[18027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.94.205.209
2019-10-15 05:50:47
84.17.62.130 attack
1,58-01/01 [bc01/m47] PostRequest-Spammer scoring: paris
2019-10-15 05:45:50
62.210.89.222 attack
SIPVicious Scanner Detection, PTR: 62-210-89-222.rev.poneytelecom.eu.
2019-10-15 05:49:05

Recently Reported IPs

211.120.133.186 146.196.21.59 30.168.224.249 7.36.17.137
140.213.156.19 33.173.148.205 175.178.123.224 135.96.106.112
228.94.104.86 221.210.208.213 232.128.17.211 36.173.31.195
186.216.70.170 25.65.142.54 29.27.13.38 168.175.243.140
182.174.148.183 192.173.176.118 89.213.126.183 215.224.42.202