Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.155.103.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14328
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.155.103.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:25:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 21.103.155.164.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 164.155.103.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.199.255.187 attackspambots
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-02 17:11:09
51.255.199.33 attackbotsspam
<6 unauthorized SSH connections
2020-08-02 17:37:40
193.93.62.13 attack
Port Scan
...
2020-08-02 17:17:31
90.70.7.10 attack
unauthorized login attempt "pi"
2020-08-02 17:41:22
104.248.88.100 attackbots
CMS (WordPress or Joomla) login attempt.
2020-08-02 17:34:58
134.209.102.130 attackspam
Hits on port : 6000 30022
2020-08-02 17:09:25
171.231.108.16 attackbots
1596340140 - 08/02/2020 05:49:00 Host: 171.231.108.16/171.231.108.16 Port: 445 TCP Blocked
2020-08-02 17:16:31
122.51.204.45 attack
Invalid user yangdeyue from 122.51.204.45 port 49930
2020-08-02 17:14:57
45.129.33.24 attack
Excessive Port-Scanning
2020-08-02 17:18:19
54.38.75.44 attackbots
SSH brute-force attempt
2020-08-02 17:39:48
142.44.185.242 attack
Fail2Ban
2020-08-02 17:32:22
193.169.253.143 attack
smtp brute force login
2020-08-02 17:10:31
49.233.213.214 attack
fail2ban -- 49.233.213.214
...
2020-08-02 17:29:02
23.152.32.242 attackbotsspam
Unauthorized connection attempt detected from IP address 23.152.32.242 to port 80
2020-08-02 17:14:15
51.178.144.21 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-02 17:34:03

Recently Reported IPs

164.155.103.168 164.155.103.216 164.155.103.203 164.155.103.212
164.155.103.229 164.155.103.237 164.155.103.221 164.155.103.224
164.155.103.238 164.155.103.28 164.155.103.220 164.155.103.29
164.155.103.41 164.155.103.42 164.155.103.33 164.155.103.50
164.155.103.59 164.155.103.60 164.155.103.63 164.155.103.53