Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.139.166.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.139.166.147.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 01:20:11 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 147.166.139.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.166.139.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.200 attack
2020-08-17T08:03:23.322284mail.broermann.family sshd[17690]: Failed password for root from 112.85.42.200 port 40628 ssh2
2020-08-17T08:03:27.188320mail.broermann.family sshd[17690]: Failed password for root from 112.85.42.200 port 40628 ssh2
2020-08-17T08:03:30.291582mail.broermann.family sshd[17690]: Failed password for root from 112.85.42.200 port 40628 ssh2
2020-08-17T08:03:30.291754mail.broermann.family sshd[17690]: error: maximum authentication attempts exceeded for root from 112.85.42.200 port 40628 ssh2 [preauth]
2020-08-17T08:03:30.291772mail.broermann.family sshd[17690]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-17 15:48:39
14.253.240.242 attackspambots
spam
2020-08-17 15:26:40
5.188.62.14 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-17T03:49:27Z and 2020-08-17T03:57:52Z
2020-08-17 15:45:48
118.69.225.57 attack
Multiple unauthorized connection attempts towards o365. User-agent: CBAInPROD. Last attempt at 2020-08-10T17:44:51.000Z UTC
2020-08-17 15:32:19
45.129.33.14 attack
Port Scan, Slow enumeration
2020-08-17 15:47:28
65.49.20.78 attackbots
Port 22 Scan, PTR: None
2020-08-17 15:58:52
106.55.149.162 attackbots
Invalid user webuser from 106.55.149.162 port 37544
2020-08-17 15:30:18
119.116.221.190 attackspambots
Unauthorised access (Aug 17) SRC=119.116.221.190 LEN=40 TTL=46 ID=47321 TCP DPT=8080 WINDOW=26732 SYN
2020-08-17 15:58:33
191.102.51.5 attackspambots
Failed password for root from 191.102.51.5 port 60178 ssh2
Invalid user samba from 191.102.51.5 port 41614
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.102.51.5
Invalid user samba from 191.102.51.5 port 41614
Failed password for invalid user samba from 191.102.51.5 port 41614 ssh2
2020-08-17 16:00:40
27.188.58.249 attackspambots
Fail2Ban Ban Triggered
2020-08-17 15:18:58
106.12.207.197 attackbots
Invalid user bot from 106.12.207.197 port 52306
2020-08-17 15:28:24
36.37.201.133 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-17T06:06:45Z and 2020-08-17T06:15:43Z
2020-08-17 15:41:35
209.33.194.75 attackbots
Port 22 Scan, PTR: None
2020-08-17 15:29:32
77.49.143.160 attackspam
Port probing on unauthorized port 23
2020-08-17 15:26:01
95.77.104.79 attackspambots
spam
2020-08-17 15:23:39

Recently Reported IPs

139.115.209.59 207.98.178.63 176.5.179.51 144.203.54.203
31.53.94.172 20.165.165.153 32.213.221.215 178.201.9.206
235.23.218.41 122.245.85.230 117.76.117.213 222.213.236.178
45.103.221.79 117.6.29.132 222.233.74.179 232.25.97.255
3.87.16.153 212.216.25.241 13.0.123.225 161.61.103.82