Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.242.161.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60222
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.242.161.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:50:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 1.161.242.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 1.161.242.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.213.20 attackbotsspam
2020-09-14T22:57:07+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-09-15 05:16:44
111.204.16.35 attack
firewall-block, port(s): 26635/tcp
2020-09-15 05:00:05
165.22.104.247 attackspambots
SSH_scan
2020-09-15 04:57:11
198.55.127.248 attack
SSH_scan
2020-09-15 04:47:12
190.81.175.66 attackbotsspam
Repeated RDP login failures. Last user: Test
2020-09-15 05:14:45
111.67.207.218 attackbots
SSH Bruteforce Attempt on Honeypot
2020-09-15 04:50:03
222.186.175.167 attack
Sep 14 22:46:18 eventyay sshd[4812]: Failed password for root from 222.186.175.167 port 1654 ssh2
Sep 14 22:46:30 eventyay sshd[4812]: Failed password for root from 222.186.175.167 port 1654 ssh2
Sep 14 22:46:30 eventyay sshd[4812]: error: maximum authentication attempts exceeded for root from 222.186.175.167 port 1654 ssh2 [preauth]
...
2020-09-15 04:53:22
62.173.152.60 attackspambots
Unauthorized connection attempt from IP address 62.173.152.60 on Port 445(SMB)
2020-09-15 04:48:26
106.12.144.57 attackspambots
$f2bV_matches
2020-09-15 05:07:16
159.65.131.92 attackbotsspam
*Port Scan* detected from 159.65.131.92 (SG/Singapore/-/Singapore (Pioneer)/-). 4 hits in the last 155 seconds
2020-09-15 04:45:01
184.71.122.210 attack
Repeated RDP login failures. Last user: Prinect
2020-09-15 05:16:20
210.121.223.61 attack
2020-09-14T19:44:42.955854upcloud.m0sh1x2.com sshd[3337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.121.223.61  user=root
2020-09-14T19:44:44.557616upcloud.m0sh1x2.com sshd[3337]: Failed password for root from 210.121.223.61 port 53474 ssh2
2020-09-15 04:55:38
120.53.117.206 attackbotsspam
RDP Bruteforce
2020-09-15 05:18:46
178.207.51.78 attack
Unauthorized connection attempt from IP address 178.207.51.78 on Port 445(SMB)
2020-09-15 05:05:00
69.55.54.65 attack
SSH_attack
2020-09-15 04:48:10

Recently Reported IPs

97.88.215.77 80.123.164.128 83.80.131.125 171.143.175.26
53.242.3.146 225.85.124.87 68.132.105.240 208.94.105.254
137.15.190.166 192.115.185.51 96.153.220.136 154.234.241.217
101.80.108.33 164.245.183.72 7.156.70.218 63.158.63.55
32.152.233.202 202.153.74.237 194.90.115.102 236.76.148.195