Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.222.242.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.222.242.161.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:58:42 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 161.242.222.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.242.222.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.37.121.67 attack
Unauthorized connection attempt from IP address 186.37.121.67 on Port 445(SMB)
2020-06-20 19:58:49
189.87.101.154 attackspam
Unauthorized connection attempt from IP address 189.87.101.154 on Port 445(SMB)
2020-06-20 19:33:54
106.13.63.114 attackbots
Invalid user silke from 106.13.63.114 port 32914
2020-06-20 19:48:39
54.36.109.74 attack
06/20/2020-04:10:27.917421 54.36.109.74 Protocol: 17 ET SCAN Sipvicious User-Agent Detected (friendly-scanner)
2020-06-20 19:57:51
183.91.15.35 attack
Unauthorized connection attempt from IP address 183.91.15.35 on Port 445(SMB)
2020-06-20 19:30:12
222.186.169.192 attack
Jun 20 13:36:54 mail sshd[24361]: Failed password for root from 222.186.169.192 port 25156 ssh2
Jun 20 13:36:58 mail sshd[24361]: Failed password for root from 222.186.169.192 port 25156 ssh2
...
2020-06-20 19:52:34
27.150.86.237 attackbotsspam
MAIL: User Login Brute Force Attempt
2020-06-20 20:03:05
36.71.233.51 attack
Attempted connection to port 445.
2020-06-20 19:50:37
178.128.227.211 attack
Jun 20 03:02:57 pixelmemory sshd[3917671]: Failed password for invalid user neu from 178.128.227.211 port 45410 ssh2
Jun 20 03:06:39 pixelmemory sshd[3921714]: Invalid user jenkins from 178.128.227.211 port 36018
Jun 20 03:06:39 pixelmemory sshd[3921714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.227.211 
Jun 20 03:06:39 pixelmemory sshd[3921714]: Invalid user jenkins from 178.128.227.211 port 36018
Jun 20 03:06:41 pixelmemory sshd[3921714]: Failed password for invalid user jenkins from 178.128.227.211 port 36018 ssh2
...
2020-06-20 19:45:20
24.19.10.253 attack
Unauthorized connection attempt detected from IP address 24.19.10.253 to port 22
2020-06-20 19:29:41
27.76.71.161 attackbotsspam
Unauthorized connection attempt from IP address 27.76.71.161 on Port 445(SMB)
2020-06-20 19:56:03
61.221.54.97 attack
Attempted connection to port 445.
2020-06-20 19:49:53
194.186.76.162 attackbots
Unauthorized connection attempt from IP address 194.186.76.162 on Port 445(SMB)
2020-06-20 19:32:52
188.191.239.35 attack
Unauthorized connection attempt detected from IP address 188.191.239.35 to port 22
2020-06-20 19:42:20
186.219.136.15 attackspambots
Attempted connection to port 445.
2020-06-20 19:54:05

Recently Reported IPs

135.5.253.193 247.0.186.5 204.137.29.153 176.246.174.97
106.43.84.111 252.66.15.226 222.178.54.49 187.46.28.187
74.225.241.105 140.163.18.130 218.161.108.184 205.74.126.56
3.189.228.15 25.204.115.217 25.48.32.110 168.95.151.218
84.118.67.99 175.144.192.127 210.222.115.158 5.136.196.196