Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.81.207.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.81.207.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:54:32 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 0.207.81.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.207.81.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.99.132.166 attack
Oct 14 21:55:21 vps01 sshd[30953]: Failed password for root from 62.99.132.166 port 35302 ssh2
2019-10-15 04:21:54
92.119.160.106 attackspam
Oct 14 21:54:08 mc1 kernel: \[2369225.318943\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=5226 PROTO=TCP SPT=48793 DPT=10651 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 14 21:58:30 mc1 kernel: \[2369486.964980\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=47805 PROTO=TCP SPT=48793 DPT=11128 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 14 21:59:15 mc1 kernel: \[2369531.681821\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.106 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=7813 PROTO=TCP SPT=48793 DPT=11121 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-15 04:27:11
54.159.0.53 attackbots
by Amazon Technologies Inc.
2019-10-15 04:29:32
50.225.152.178 attackspambots
Oct 14 21:59:58 cvbnet sshd[8144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.225.152.178 
Oct 14 21:59:59 cvbnet sshd[8144]: Failed password for invalid user nohack from 50.225.152.178 port 46515 ssh2
...
2019-10-15 04:03:07
163.44.170.33 attack
Oct 14 19:06:41 XXXXXX sshd[25723]: Invalid user gmodserver from 163.44.170.33 port 47684
2019-10-15 04:06:57
1.173.100.140 attack
firewall-block, port(s): 23/tcp
2019-10-15 04:03:30
46.38.144.179 attackbotsspam
Oct 14 15:59:28 web1 postfix/smtpd[24188]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: authentication failure
...
2019-10-15 04:19:56
192.99.166.179 attackspam
detected by Fail2Ban
2019-10-15 04:07:56
157.230.168.4 attackbots
Oct 14 16:11:47 ny01 sshd[30479]: Failed password for root from 157.230.168.4 port 51624 ssh2
Oct 14 16:15:53 ny01 sshd[30867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.168.4
Oct 14 16:15:55 ny01 sshd[30867]: Failed password for invalid user shah from 157.230.168.4 port 35324 ssh2
2019-10-15 04:19:23
222.186.173.154 attackbotsspam
Oct 14 22:27:48 meumeu sshd[1582]: Failed password for root from 222.186.173.154 port 53402 ssh2
Oct 14 22:28:08 meumeu sshd[1582]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 53402 ssh2 [preauth]
Oct 14 22:28:18 meumeu sshd[1658]: Failed password for root from 222.186.173.154 port 8744 ssh2
...
2019-10-15 04:33:09
103.233.76.254 attackbots
$f2bV_matches
2019-10-15 04:14:01
159.203.73.181 attack
Oct 14 09:52:14 kapalua sshd\[28103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
Oct 14 09:52:16 kapalua sshd\[28103\]: Failed password for root from 159.203.73.181 port 52285 ssh2
Oct 14 09:56:00 kapalua sshd\[28582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
Oct 14 09:56:02 kapalua sshd\[28582\]: Failed password for root from 159.203.73.181 port 43720 ssh2
Oct 14 09:59:50 kapalua sshd\[29023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=joinlincoln.org  user=root
2019-10-15 04:12:29
92.84.247.64 attackspam
Telnetd brute force attack detected by fail2ban
2019-10-15 04:11:22
112.85.42.232 attackbotsspam
F2B jail: sshd. Time: 2019-10-14 22:18:21, Reported by: VKReport
2019-10-15 04:19:39
139.199.248.153 attackbotsspam
Oct 14 21:55:43 MK-Soft-VM3 sshd[22684]: Failed password for root from 139.199.248.153 port 33226 ssh2
...
2019-10-15 04:09:05

Recently Reported IPs

192.107.248.141 138.66.222.212 65.90.233.37 231.83.77.47
58.42.151.76 194.130.231.63 137.26.185.6 12.108.223.120
58.74.254.64 177.36.50.165 13.142.61.33 108.124.152.29
12.22.185.35 5.18.197.162 189.209.198.250 27.171.131.156
56.21.212.255 210.47.69.96 253.205.59.20 24.19.84.157