Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.220.196.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12549
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.220.196.221.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 14:05:38 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 221.196.220.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 221.196.220.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.213.165.189 attackbotsspam
Apr 27 09:45:32 srv-ubuntu-dev3 sshd[73416]: Invalid user test from 188.213.165.189
Apr 27 09:45:32 srv-ubuntu-dev3 sshd[73416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.165.189
Apr 27 09:45:32 srv-ubuntu-dev3 sshd[73416]: Invalid user test from 188.213.165.189
Apr 27 09:45:34 srv-ubuntu-dev3 sshd[73416]: Failed password for invalid user test from 188.213.165.189 port 42714 ssh2
Apr 27 09:49:18 srv-ubuntu-dev3 sshd[74026]: Invalid user paul from 188.213.165.189
Apr 27 09:49:18 srv-ubuntu-dev3 sshd[74026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.165.189
Apr 27 09:49:18 srv-ubuntu-dev3 sshd[74026]: Invalid user paul from 188.213.165.189
Apr 27 09:49:19 srv-ubuntu-dev3 sshd[74026]: Failed password for invalid user paul from 188.213.165.189 port 54076 ssh2
Apr 27 09:53:06 srv-ubuntu-dev3 sshd[74661]: Invalid user cvs from 188.213.165.189
...
2020-04-27 16:25:16
167.99.66.193 attack
Apr 27 09:52:04 ns382633 sshd\[22735\]: Invalid user amp from 167.99.66.193 port 33639
Apr 27 09:52:04 ns382633 sshd\[22735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
Apr 27 09:52:06 ns382633 sshd\[22735\]: Failed password for invalid user amp from 167.99.66.193 port 33639 ssh2
Apr 27 10:02:56 ns382633 sshd\[24691\]: Invalid user vic from 167.99.66.193 port 45789
Apr 27 10:02:56 ns382633 sshd\[24691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
2020-04-27 17:01:18
88.245.161.71 attackbotsspam
Automatic report - Port Scan Attack
2020-04-27 16:26:06
157.230.151.241 attack
detected by Fail2Ban
2020-04-27 16:29:29
192.144.218.143 attackbotsspam
Apr 27 00:56:41 server1 sshd\[32257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143 
Apr 27 00:56:42 server1 sshd\[32257\]: Failed password for invalid user ftpuser from 192.144.218.143 port 44842 ssh2
Apr 27 00:58:15 server1 sshd\[341\]: Invalid user remote from 192.144.218.143
Apr 27 00:58:15 server1 sshd\[341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.143 
Apr 27 00:58:17 server1 sshd\[341\]: Failed password for invalid user remote from 192.144.218.143 port 33606 ssh2
...
2020-04-27 16:35:56
45.55.179.132 attackspam
$f2bV_matches
2020-04-27 16:59:07
207.46.13.92 attackbotsspam
Automatic report - Banned IP Access
2020-04-27 16:34:22
94.42.165.180 attackbots
Apr 27 03:15:29 mail sshd\[44147\]: Invalid user teapot from 94.42.165.180
Apr 27 03:15:29 mail sshd\[44147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.165.180
...
2020-04-27 16:45:14
74.82.47.37 attackbotsspam
srv02 Mass scanning activity detected Target: 1883  ..
2020-04-27 17:03:07
121.167.34.252 attackspam
Wordpress malicious attack:[sshd]
2020-04-27 16:33:39
85.109.182.37 attack
Automatic report - Port Scan Attack
2020-04-27 17:02:34
45.55.32.34 attackspambots
Apr 27 08:15:45 debian-2gb-nbg1-2 kernel: \[10227077.600183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.55.32.34 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3830 PROTO=TCP SPT=49801 DPT=30331 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-27 16:32:25
106.12.179.81 attackbots
Apr 27 08:05:01 ArkNodeAT sshd\[12795\]: Invalid user server from 106.12.179.81
Apr 27 08:05:01 ArkNodeAT sshd\[12795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.81
Apr 27 08:05:03 ArkNodeAT sshd\[12795\]: Failed password for invalid user server from 106.12.179.81 port 42234 ssh2
2020-04-27 16:29:47
49.88.112.69 attack
Found by fail2ban
2020-04-27 16:53:47
190.178.200.31 attack
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2020-04-27 16:56:25

Recently Reported IPs

131.233.61.29 33.79.101.115 62.36.99.219 185.217.86.19
111.207.13.88 195.160.38.238 113.131.200.22 84.103.176.152
60.29.188.134 176.12.193.241 81.202.213.176 134.34.84.77
98.142.64.44 137.36.253.137 81.31.105.94 57.251.113.183
51.108.42.8 104.248.149.214 212.85.35.205 73.186.4.41