Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bellflower

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.164.214.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55401
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;166.164.214.140.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 20:22:34 CST 2019
;; MSG SIZE  rcvd: 119
Host info
140.214.164.166.in-addr.arpa domain name pointer 140.sub-166-164-214.myvzw.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
140.214.164.166.in-addr.arpa	name = 140.sub-166-164-214.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.19.68.26 attackbotsspam
ThinkPHP Remote Code Execution Vulnerability
2019-07-13 11:05:03
139.59.81.180 attack
SSH Bruteforce Attack
2019-07-13 11:19:48
158.140.189.62 attackbotsspam
WordPress brute force
2019-07-13 11:10:18
1.52.248.205 attackspambots
Unauthorized connection attempt from IP address 1.52.248.205 on Port 445(SMB)
2019-07-13 11:39:27
144.202.86.185 attackbots
WordPress brute force
2019-07-13 11:17:38
59.125.247.227 attackbotsspam
Jul 12 22:33:37 mail sshd\[14425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.247.227  user=www-data
Jul 12 22:33:39 mail sshd\[14425\]: Failed password for www-data from 59.125.247.227 port 58099 ssh2
Jul 12 22:39:45 mail sshd\[14571\]: Invalid user admin from 59.125.247.227 port 53362
Jul 12 22:39:45 mail sshd\[14571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.247.227
Jul 12 22:39:46 mail sshd\[14571\]: Failed password for invalid user admin from 59.125.247.227 port 53362 ssh2
...
2019-07-13 11:36:39
203.210.244.139 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-12 16:02:55,875 INFO [shellcode_manager] (203.210.244.139) no match, writing hexdump (222f7d881ded1871724a1b9a1cb94247 :120) - SMB (Unknown)
2019-07-13 11:27:53
98.203.136.190 attack
:
2019-07-13 11:20:08
42.55.33.231 attack
:
2019-07-13 11:25:13
193.188.22.12 attackbots
SSH-BruteForce
2019-07-13 11:40:26
162.241.211.155 attackspam
xmlrpc attack
2019-07-13 11:21:54
159.65.149.131 attack
Jul 13 02:50:38 *** sshd[3692]: Invalid user chicago from 159.65.149.131
2019-07-13 11:30:44
145.239.91.91 attackbots
2019-07-12T22:18:13.855473stark.klein-stark.info sshd\[26761\]: Invalid user bj from 145.239.91.91 port 48801
2019-07-12T22:18:13.861322stark.klein-stark.info sshd\[26761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-145-239-91.eu
2019-07-12T22:18:15.389262stark.klein-stark.info sshd\[26761\]: Failed password for invalid user bj from 145.239.91.91 port 48801 ssh2
...
2019-07-13 11:28:09
189.86.186.122 attack
Unauthorized connection attempt from IP address 189.86.186.122 on Port 445(SMB)
2019-07-13 11:41:35
123.148.209.237 attackspambots
WordPress brute force
2019-07-13 11:32:44

Recently Reported IPs

63.194.83.106 174.106.84.8 41.250.98.164 188.170.193.115
94.29.228.129 221.167.194.10 173.49.15.214 36.234.164.29
14.207.140.253 100.1.72.22 81.162.112.195 83.209.148.19
119.248.0.85 119.161.97.139 201.189.113.201 90.206.50.213
123.215.198.253 222.208.217.75 114.41.249.196 85.19.200.203