Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Finland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.141.162.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22888
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.141.162.216.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 24 19:06:46 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 216.162.141.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 216.162.141.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.252.169.145 attack
Port probing on unauthorized port 445
2020-06-07 05:04:58
61.190.74.75 attack
scan z
2020-06-07 05:09:14
106.75.35.150 attackbotsspam
Jun  6 22:44:52 [host] sshd[318]: pam_unix(sshd:au
Jun  6 22:44:54 [host] sshd[318]: Failed password 
Jun  6 22:50:15 [host] sshd[492]: pam_unix(sshd:au
2020-06-07 05:09:58
106.13.232.65 attackbots
bruteforce detected
2020-06-07 05:05:37
110.232.95.199 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-06-07 05:21:55
31.15.89.168 attackbots
Unauthorized connection attempt from IP address 31.15.89.168 on Port 445(SMB)
2020-06-07 05:05:59
185.39.11.47 attackbotsspam
Jun  6 23:06:59 debian-2gb-nbg1-2 kernel: \[13736366.644854\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.11.47 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=28160 PROTO=TCP SPT=52416 DPT=35041 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-07 05:29:44
103.76.204.66 attack
Unauthorized connection attempt from IP address 103.76.204.66 on Port 445(SMB)
2020-06-07 05:21:36
103.243.252.20 attackbots
Jun  7 06:38:05 web1 sshd[20514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20  user=root
Jun  7 06:38:07 web1 sshd[20514]: Failed password for root from 103.243.252.20 port 49710 ssh2
Jun  7 06:45:23 web1 sshd[22332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20  user=root
Jun  7 06:45:25 web1 sshd[22332]: Failed password for root from 103.243.252.20 port 37442 ssh2
Jun  7 06:50:06 web1 sshd[23497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20  user=root
Jun  7 06:50:08 web1 sshd[23497]: Failed password for root from 103.243.252.20 port 55036 ssh2
Jun  7 06:55:42 web1 sshd[24929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.20  user=root
Jun  7 06:55:44 web1 sshd[24929]: Failed password for root from 103.243.252.20 port 44428 ssh2
Jun  7 07:00:53 web1 sshd[26
...
2020-06-07 05:02:36
61.64.110.46 attack
Unauthorized connection attempt from IP address 61.64.110.46 on Port 445(SMB)
2020-06-07 04:56:07
47.56.229.33 attackbotsspam
WordPress brute force
2020-06-07 05:32:25
94.97.25.69 attackspam
Unauthorized connection attempt from IP address 94.97.25.69 on Port 445(SMB)
2020-06-07 04:58:22
131.161.213.161 attack
Unauthorized connection attempt from IP address 131.161.213.161 on Port 445(SMB)
2020-06-07 05:00:02
157.230.230.152 attackspambots
Jun  6 22:58:36 piServer sshd[30655]: Failed password for root from 157.230.230.152 port 40532 ssh2
Jun  6 23:01:53 piServer sshd[30829]: Failed password for root from 157.230.230.152 port 44848 ssh2
...
2020-06-07 05:17:26
51.254.129.170 attackbotsspam
Jun  6 22:42:54 sip sshd[567520]: Failed password for root from 51.254.129.170 port 42806 ssh2
Jun  6 22:45:54 sip sshd[567547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.129.170  user=root
Jun  6 22:45:56 sip sshd[567547]: Failed password for root from 51.254.129.170 port 45358 ssh2
...
2020-06-07 04:55:38

Recently Reported IPs

198.220.20.132 15.254.59.39 31.23.31.195 27.211.228.161
222.188.98.40 43.241.57.8 176.109.165.58 113.194.141.70
201.163.72.150 218.60.67.15 228.36.202.105 197.52.57.52
227.4.20.221 197.101.11.118 157.55.39.215 198.1.76.160
149.248.18.22 82.179.237.172 183.166.98.239 157.55.39.54