Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medellín

Region: Antioquia

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.138.166.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.138.166.85.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032401 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 10:55:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
85.166.138.181.in-addr.arpa domain name pointer hfc-181-138-166-85.une.net.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.166.138.181.in-addr.arpa	name = hfc-181-138-166-85.une.net.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.197.16 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-13 15:17:18
113.160.148.11 attackbots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-13 15:36:11
61.177.172.128 attackspambots
Jan 13 03:53:53 firewall sshd[26486]: Failed password for root from 61.177.172.128 port 36249 ssh2
Jan 13 03:53:57 firewall sshd[26486]: Failed password for root from 61.177.172.128 port 36249 ssh2
Jan 13 03:54:00 firewall sshd[26486]: Failed password for root from 61.177.172.128 port 36249 ssh2
...
2020-01-13 15:14:21
124.205.139.75 attack
Jan 13 07:03:47 host postfix/smtpd[50529]: warning: unknown[124.205.139.75]: SASL LOGIN authentication failed: authentication failure
Jan 13 07:04:01 host postfix/smtpd[50529]: warning: unknown[124.205.139.75]: SASL LOGIN authentication failed: authentication failure
...
2020-01-13 15:08:39
106.13.236.114 attackspam
$f2bV_matches
2020-01-13 15:02:56
122.96.42.103 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:27:08
118.161.153.234 attackspambots
Honeypot attack, port: 81, PTR: 118-161-153-234.dynamic-ip.hinet.net.
2020-01-13 15:33:17
13.78.40.80 attackspam
Jan 13 10:35:51 gw1 sshd[12300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.78.40.80
Jan 13 10:35:53 gw1 sshd[12300]: Failed password for invalid user janice from 13.78.40.80 port 20001 ssh2
...
2020-01-13 15:22:07
122.51.72.86 attack
Unauthorized connection attempt detected from IP address 122.51.72.86 to port 2220 [J]
2020-01-13 15:35:45
149.202.115.156 attack
Unauthorized connection attempt detected from IP address 149.202.115.156 to port 2220 [J]
2020-01-13 15:24:45
188.173.80.134 attackspam
Unauthorized connection attempt detected from IP address 188.173.80.134 to port 2220 [J]
2020-01-13 14:59:15
217.147.226.156 attackbotsspam
SSH Brute Force
2020-01-13 15:09:02
39.61.33.46 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:20:51
110.232.255.134 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 15:20:02
59.125.249.75 attackbots
unauthorized connection attempt
2020-01-13 15:36:41

Recently Reported IPs

235.167.227.167 138.133.43.234 80.213.124.218 255.234.165.165
145.128.143.70 170.241.210.37 204.147.33.242 239.125.219.165
154.172.46.204 179.127.145.30 98.207.229.151 104.177.166.160
47.255.191.203 138.88.207.108 10.51.186.188 193.189.138.51
136.225.88.148 121.106.35.188 122.81.248.217 67.61.134.119