Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.3.55.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54743
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;165.3.55.166.			IN	A

;; AUTHORITY SECTION:
.			389	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080602 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 06 18:42:07 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 166.55.3.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.55.3.165.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
159.65.164.210 attack
Dec 15 05:04:23 eddieflores sshd\[6037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210  user=mysql
Dec 15 05:04:25 eddieflores sshd\[6037\]: Failed password for mysql from 159.65.164.210 port 58836 ssh2
Dec 15 05:09:42 eddieflores sshd\[6623\]: Invalid user guest from 159.65.164.210
Dec 15 05:09:42 eddieflores sshd\[6623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.164.210
Dec 15 05:09:44 eddieflores sshd\[6623\]: Failed password for invalid user guest from 159.65.164.210 port 37788 ssh2
2019-12-15 23:17:38
213.173.109.249 attack
Lines containing failures of 213.173.109.249
Dec 15 15:59:31 kmh-vmh-002-fsn07 sshd[10923]: Invalid user werdenberg from 213.173.109.249 port 54710
Dec 15 15:59:31 kmh-vmh-002-fsn07 sshd[10923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.173.109.249 
Dec 15 15:59:33 kmh-vmh-002-fsn07 sshd[10923]: Failed password for invalid user werdenberg from 213.173.109.249 port 54710 ssh2
Dec 15 15:59:33 kmh-vmh-002-fsn07 sshd[10923]: Received disconnect from 213.173.109.249 port 54710:11: Bye Bye [preauth]
Dec 15 15:59:33 kmh-vmh-002-fsn07 sshd[10923]: Disconnected from invalid user werdenberg 213.173.109.249 port 54710 [preauth]
Dec 15 16:06:12 kmh-vmh-002-fsn07 sshd[20991]: Invalid user bkupexec from 213.173.109.249 port 49684
Dec 15 16:06:12 kmh-vmh-002-fsn07 sshd[20991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.173.109.249 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html
2019-12-15 23:36:03
177.66.200.38 attackbotsspam
frenzy
2019-12-15 23:24:57
138.68.20.158 attackbotsspam
Dec 15 16:26:46 amit sshd\[17206\]: Invalid user ftp_test from 138.68.20.158
Dec 15 16:26:46 amit sshd\[17206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.20.158
Dec 15 16:26:48 amit sshd\[17206\]: Failed password for invalid user ftp_test from 138.68.20.158 port 49830 ssh2
...
2019-12-15 23:31:23
193.112.19.70 attack
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: Invalid user rubibl from 193.112.19.70 port 52370
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.70
Dec 15 22:26:31 lcl-usvr-02 sshd[5984]: Invalid user rubibl from 193.112.19.70 port 52370
Dec 15 22:26:33 lcl-usvr-02 sshd[5984]: Failed password for invalid user rubibl from 193.112.19.70 port 52370 ssh2
Dec 15 22:31:08 lcl-usvr-02 sshd[6947]: Invalid user walter from 193.112.19.70 port 35392
...
2019-12-15 23:32:05
71.6.199.23 attack
12/15/2019-09:54:44.130845 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-12-15 22:55:58
222.186.173.238 attackspambots
Dec 15 16:15:42 MK-Soft-Root2 sshd[19846]: Failed password for root from 222.186.173.238 port 40784 ssh2
Dec 15 16:15:47 MK-Soft-Root2 sshd[19846]: Failed password for root from 222.186.173.238 port 40784 ssh2
...
2019-12-15 23:22:36
62.210.119.149 attackspambots
Dec 15 15:20:08 zeus sshd[5399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.119.149 
Dec 15 15:20:10 zeus sshd[5399]: Failed password for invalid user dedil from 62.210.119.149 port 60274 ssh2
Dec 15 15:25:18 zeus sshd[5511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.119.149 
Dec 15 15:25:19 zeus sshd[5511]: Failed password for invalid user hussein from 62.210.119.149 port 38238 ssh2
2019-12-15 23:28:00
183.82.100.107 attackspambots
Unauthorized connection attempt detected from IP address 183.82.100.107 to port 445
2019-12-15 23:02:18
164.164.122.43 attackbotsspam
Dec 15 15:47:37 meumeu sshd[29021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.164.122.43 
Dec 15 15:47:38 meumeu sshd[29021]: Failed password for invalid user prueba from 164.164.122.43 port 54150 ssh2
Dec 15 15:54:19 meumeu sshd[30173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.164.122.43 
...
2019-12-15 23:12:19
80.211.67.90 attack
Dec 15 09:54:23 TORMINT sshd\[10513\]: Invalid user rob from 80.211.67.90
Dec 15 09:54:23 TORMINT sshd\[10513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
Dec 15 09:54:25 TORMINT sshd\[10513\]: Failed password for invalid user rob from 80.211.67.90 port 57352 ssh2
...
2019-12-15 23:04:40
92.80.202.17 attackspambots
19/12/15@09:54:22: FAIL: IoT-Telnet address from=92.80.202.17
...
2019-12-15 23:07:57
79.137.116.6 attack
Dec 15 10:13:28 plusreed sshd[9358]: Invalid user erinn from 79.137.116.6
...
2019-12-15 23:23:54
36.99.169.195 attackspam
Dec 15 09:47:54 linuxvps sshd\[56682\]: Invalid user ktyam from 36.99.169.195
Dec 15 09:47:54 linuxvps sshd\[56682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.169.195
Dec 15 09:47:55 linuxvps sshd\[56682\]: Failed password for invalid user ktyam from 36.99.169.195 port 57868 ssh2
Dec 15 09:54:26 linuxvps sshd\[61117\]: Invalid user hafskjold from 36.99.169.195
Dec 15 09:54:26 linuxvps sshd\[61117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.169.195
2019-12-15 23:05:00
91.121.103.175 attack
--- report ---
Dec 15 11:55:01 sshd: Connection from 91.121.103.175 port 36482
Dec 15 11:55:02 sshd: Invalid user althoff from 91.121.103.175
Dec 15 11:55:04 sshd: Failed password for invalid user althoff from 91.121.103.175 port 36482 ssh2
Dec 15 11:55:05 sshd: Received disconnect from 91.121.103.175: 11: Bye Bye [preauth]
2019-12-15 23:17:54

Recently Reported IPs

55.133.206.23 47.98.103.85 36.72.16.216 115.159.157.103
192.227.223.218 81.219.94.116 188.148.136.99 219.134.217.161
180.245.41.226 238.133.243.83 188.162.192.21 202.143.111.220
206.189.190.5 220.130.157.36 218.157.64.77 39.53.107.209
209.97.128.229 200.42.137.129 187.91.229.59 88.250.26.245