Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.64.240.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.64.240.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 20:30:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 194.240.64.164.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 164.64.240.194.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.84.65.13 attackspambots
1579064160 - 01/15/2020 05:56:00 Host: 36.84.65.13/36.84.65.13 Port: 445 TCP Blocked
2020-01-15 13:01:29
58.58.224.162 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:11:06
36.81.164.247 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:14:03
211.76.41.177 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-15 13:20:20
222.186.180.8 attackbots
Jan 15 06:16:47 meumeu sshd[2628]: Failed password for root from 222.186.180.8 port 42326 ssh2
Jan 15 06:16:51 meumeu sshd[2628]: Failed password for root from 222.186.180.8 port 42326 ssh2
Jan 15 06:16:55 meumeu sshd[2628]: Failed password for root from 222.186.180.8 port 42326 ssh2
Jan 15 06:17:00 meumeu sshd[2628]: Failed password for root from 222.186.180.8 port 42326 ssh2
...
2020-01-15 13:23:36
182.61.130.121 attackbots
Unauthorized connection attempt detected from IP address 182.61.130.121 to port 2220 [J]
2020-01-15 13:12:36
88.2.51.80 attackspambots
Honeypot attack, port: 81, PTR: 80.red-88-2-51.staticip.rima-tde.net.
2020-01-15 13:20:38
180.179.206.36 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:14:38
115.132.156.21 attackbots
1579064157 - 01/15/2020 05:55:57 Host: 115.132.156.21/115.132.156.21 Port: 445 TCP Blocked
2020-01-15 13:05:05
222.127.30.130 attackspam
Invalid user ftpuser from 222.127.30.130 port 28696
2020-01-15 09:27:46
139.59.136.64 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-01-15 13:00:15
77.222.114.160 attack
Honeypot attack, port: 5555, PTR: pool-77-222-114-160.is74.ru.
2020-01-15 13:37:34
110.232.64.140 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-15 13:18:33
139.59.91.165 attackspambots
Unauthorized connection attempt detected from IP address 139.59.91.165 to port 2220 [J]
2020-01-15 09:26:31
202.5.37.241 attack
TCP src-port=52699   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious & Spammer)   (604)
2020-01-15 09:28:17

Recently Reported IPs

223.130.63.56 74.13.227.69 176.151.161.5 26.110.229.137
252.79.111.211 255.165.29.71 12.38.199.108 171.78.135.34
158.216.110.239 211.252.248.81 70.148.149.163 119.74.28.61
33.86.175.27 45.245.108.141 126.138.35.140 134.122.115.243
37.195.51.169 178.86.69.111 45.215.157.9 122.82.1.66