Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.122.240.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.122.240.193.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 158 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:56:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 193.240.122.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 164.122.240.193.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.53.20.179 attackbots
Jun 22 08:58:13 lukav-desktop sshd\[15530\]: Invalid user deploy from 106.53.20.179
Jun 22 08:58:13 lukav-desktop sshd\[15530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.179
Jun 22 08:58:14 lukav-desktop sshd\[15530\]: Failed password for invalid user deploy from 106.53.20.179 port 57130 ssh2
Jun 22 09:00:18 lukav-desktop sshd\[15559\]: Invalid user user from 106.53.20.179
Jun 22 09:00:18 lukav-desktop sshd\[15559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.20.179
2020-06-22 14:13:39
85.209.0.102 attack
...
2020-06-22 14:34:59
106.12.89.184 attackbots
2020-06-22T00:04:23.280321morrigan.ad5gb.com sshd[27265]: Invalid user teste from 106.12.89.184 port 60062
2020-06-22T00:04:25.679622morrigan.ad5gb.com sshd[27265]: Failed password for invalid user teste from 106.12.89.184 port 60062 ssh2
2020-06-22T00:04:27.374805morrigan.ad5gb.com sshd[27265]: Disconnected from invalid user teste 106.12.89.184 port 60062 [preauth]
2020-06-22 14:22:11
118.99.104.141 attackspam
ssh brute force
2020-06-22 14:09:57
62.215.44.113 attackspambots
Failed password for invalid user kannel from 62.215.44.113 port 47416 ssh2
2020-06-22 14:25:42
2.229.4.181 attack
Failed password for invalid user test from 2.229.4.181 port 43968 ssh2
2020-06-22 14:20:11
46.30.45.74 attackbots
Automatic report - XMLRPC Attack
2020-06-22 14:33:36
93.100.195.242 attackspam
" "
2020-06-22 14:33:17
112.70.191.130 attackspambots
Bruteforce detected by fail2ban
2020-06-22 14:28:27
125.24.5.50 attack
1592798006 - 06/22/2020 05:53:26 Host: 125.24.5.50/125.24.5.50 Port: 445 TCP Blocked
2020-06-22 14:19:26
104.248.134.212 attackspambots
ssh brute force
2020-06-22 14:11:18
123.207.99.189 attackspam
Jun 22 03:53:27 scw-tender-jepsen sshd[32466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.99.189
Jun 22 03:53:29 scw-tender-jepsen sshd[32466]: Failed password for invalid user mother from 123.207.99.189 port 44656 ssh2
2020-06-22 14:21:48
106.13.126.141 attackspambots
SSH brute-force: detected 11 distinct username(s) / 12 distinct password(s) within a 24-hour window.
2020-06-22 14:25:26
185.143.75.153 attackbotsspam
Jun 22 08:19:31 relay postfix/smtpd\[24948\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 08:19:57 relay postfix/smtpd\[12975\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 08:20:16 relay postfix/smtpd\[31452\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 08:20:43 relay postfix/smtpd\[12318\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 22 08:21:02 relay postfix/smtpd\[24615\]: warning: unknown\[185.143.75.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-22 14:23:57
159.65.59.41 attackspam
(sshd) Failed SSH login from 159.65.59.41 (GB/United Kingdom/-): 5 in the last 3600 secs
2020-06-22 14:31:23

Recently Reported IPs

167.10.133.58 231.18.115.207 56.160.93.50 219.218.237.162
48.79.44.24 39.32.162.102 119.45.211.78 186.160.244.12
118.101.95.127 231.83.46.82 139.242.91.20 133.208.215.219
202.122.44.107 203.185.228.207 254.186.140.59 198.141.87.14
9.236.155.61 149.76.32.242 12.137.48.134 3.137.123.168