Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.94.19.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.94.19.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:53:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
166.19.94.159.in-addr.arpa domain name pointer h159-94-19-166.mdsnwi.tisp.static.tds.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.19.94.159.in-addr.arpa	name = h159-94-19-166.mdsnwi.tisp.static.tds.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.39.145.59 attackspam
Nov 25 09:52:02 www sshd\[64358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.59  user=root
Nov 25 09:52:04 www sshd\[64358\]: Failed password for root from 54.39.145.59 port 52580 ssh2
Nov 25 09:58:18 www sshd\[64442\]: Invalid user tothero from 54.39.145.59
...
2019-11-25 16:02:25
27.128.164.82 attackspambots
Nov 25 12:26:20 gw1 sshd[7390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.164.82
Nov 25 12:26:22 gw1 sshd[7390]: Failed password for invalid user caimi from 27.128.164.82 port 41632 ssh2
...
2019-11-25 15:39:37
180.68.177.15 attack
Nov 25 14:39:38 webhost01 sshd[21115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.68.177.15
Nov 25 14:39:39 webhost01 sshd[21115]: Failed password for invalid user quickert from 180.68.177.15 port 45886 ssh2
...
2019-11-25 15:43:18
125.227.130.5 attack
Nov 25 08:32:55 markkoudstaal sshd[32090]: Failed password for root from 125.227.130.5 port 33138 ssh2
Nov 25 08:40:05 markkoudstaal sshd[32693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.130.5
Nov 25 08:40:07 markkoudstaal sshd[32693]: Failed password for invalid user admin from 125.227.130.5 port 51979 ssh2
2019-11-25 15:44:59
66.249.79.125 attackbotsspam
Automatic report - Banned IP Access
2019-11-25 16:01:18
159.65.164.210 attack
Nov 25 07:41:00 ns382633 sshd\[11423\]: Invalid user caddy from 159.65.164.210 port 60162
Nov 25 07:41:00 ns382633 sshd\[11423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210
Nov 25 07:41:02 ns382633 sshd\[11423\]: Failed password for invalid user caddy from 159.65.164.210 port 60162 ssh2
Nov 25 07:57:05 ns382633 sshd\[14325\]: Invalid user wooiyi from 159.65.164.210 port 37028
Nov 25 07:57:05 ns382633 sshd\[14325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210
2019-11-25 15:53:42
123.207.231.63 attackbotsspam
Automatic report - Banned IP Access
2019-11-25 16:11:58
124.153.75.18 attackspam
Nov 24 21:27:53 hpm sshd\[11051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.153.75.18  user=root
Nov 24 21:27:55 hpm sshd\[11051\]: Failed password for root from 124.153.75.18 port 47160 ssh2
Nov 24 21:31:40 hpm sshd\[11355\]: Invalid user appuser from 124.153.75.18
Nov 24 21:31:40 hpm sshd\[11355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.153.75.18
Nov 24 21:31:42 hpm sshd\[11355\]: Failed password for invalid user appuser from 124.153.75.18 port 40292 ssh2
2019-11-25 15:32:55
46.105.29.160 attackbots
2019-11-25T07:32:16.633660abusebot-2.cloudsearch.cf sshd\[21797\]: Invalid user tejal from 46.105.29.160 port 53994
2019-11-25 15:38:28
149.56.23.154 attack
Nov 25 07:24:50 markkoudstaal sshd[26535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.23.154
Nov 25 07:24:51 markkoudstaal sshd[26535]: Failed password for invalid user mysql from 149.56.23.154 port 38992 ssh2
Nov 25 07:29:50 markkoudstaal sshd[26991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.23.154
2019-11-25 16:13:34
68.183.224.118 attackspam
Nov 25 06:22:34 web8 sshd\[3627\]: Invalid user gwin from 68.183.224.118
Nov 25 06:22:34 web8 sshd\[3627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.224.118
Nov 25 06:22:36 web8 sshd\[3627\]: Failed password for invalid user gwin from 68.183.224.118 port 44228 ssh2
Nov 25 06:30:22 web8 sshd\[7700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.224.118  user=root
Nov 25 06:30:24 web8 sshd\[7700\]: Failed password for root from 68.183.224.118 port 56108 ssh2
2019-11-25 16:00:57
80.211.9.57 attackbotsspam
Nov 25 06:32:52 server sshd\[32677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cloud-io.cloud  user=nagios
Nov 25 06:32:54 server sshd\[32677\]: Failed password for nagios from 80.211.9.57 port 32866 ssh2
Nov 25 10:32:28 server sshd\[29813\]: Invalid user butter from 80.211.9.57
Nov 25 10:32:28 server sshd\[29813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cloud-io.cloud 
Nov 25 10:32:31 server sshd\[29813\]: Failed password for invalid user butter from 80.211.9.57 port 34394 ssh2
...
2019-11-25 15:36:39
218.92.0.208 attack
2019-11-25T07:32:05.316952abusebot-4.cloudsearch.cf sshd\[17080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.208  user=root
2019-11-25 15:40:33
115.68.220.10 attackspambots
Nov 25 07:25:26 meumeu sshd[25292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.220.10 
Nov 25 07:25:28 meumeu sshd[25292]: Failed password for invalid user test from 115.68.220.10 port 44692 ssh2
Nov 25 07:31:24 meumeu sshd[25932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.220.10 
...
2019-11-25 15:34:36
189.18.28.54 attack
Automatic report - Port Scan Attack
2019-11-25 15:42:59

Recently Reported IPs

20.178.161.27 228.193.142.111 27.206.215.230 39.235.4.64
54.6.163.249 197.172.155.167 221.83.116.39 234.38.152.37
2.220.70.92 221.72.24.67 201.225.173.65 91.31.0.151
149.173.168.36 56.143.79.199 184.206.176.136 233.208.179.104
23.179.10.153 126.82.149.157 200.44.98.85 18.190.215.8