Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Fe

Region: Santa Fe

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
181.166.209.15 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-02-27 21:43:56
181.166.207.74 attack
Autoban   181.166.207.74 AUTH/CONNECT
2019-06-25 11:39:22
Whois info:
% IP Client: 124.223.158.242
 
% Joint Whois - whois.lacnic.net
%  This server accepts single ASN, IPv4 or IPv6 queries

% LACNIC resource: whois.lacnic.net


% Copyright LACNIC lacnic.net
%  The data below is provided for information purposes
%  and to assist persons in obtaining information about or
%  related to AS and IP numbers registrations
%  By submitting a whois query, you agree to use this data
%  only for lawful purposes.
%  2026-04-18 08:59:38 (-03 -03:00)

inetnum:     181.164.0.0/14
status:      allocated
aut-num:     AS7303
owner:       Telecom Argentina S.A.
ownerid:     AR-TAST-LACNIC
responsible: Administrador IP
address:     Dorrego, 2520, Piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54  1149684975 [0000]
owner-c:     ADI2
tech-c:      ADI2
abuse-c:     ADI2
inetrev:     181.164.0.0/14
nserver:     DNS1.CVTCI.COM.AR
nsstat:      20260418 AA
nslastaa:    20260418
nserver:     DNS2.CVTCI.COM.AR
nsstat:      20260418 AA
nslastaa:    20260418
created:     20111228
changed:     20180529

nic-hdl:     ADI2
person:      Administrador IP
e-mail:      abuse@telcoar.com
address:     Dorrego, 2502, piso 11
address:     1425 - Buenos Aires - 
country:     AR
phone:       +54  114968 [4975]
created:     20020909
changed:     20260326

% whois.lacnic.net accepts only direct match queries.
% Types of queries are: POCs, ownerid, CIDR blocks, IP
% and AS numbers.
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 181.166.20.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;181.166.20.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 19:59:38 CST 2026
;; MSG SIZE  rcvd: 107
Host info
160.20.166.181.in-addr.arpa domain name pointer 160-20-166-181.fibertel.com.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
160.20.166.181.in-addr.arpa	name = 160-20-166-181.fibertel.com.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.219.8.185 attackspambots
2020-01-06T15:16:36.568791beta postfix/smtpd[4683]: warning: unknown[139.219.8.185]: SASL LOGIN authentication failed: authentication failure
2020-01-06T15:16:40.412485beta postfix/smtpd[4683]: warning: unknown[139.219.8.185]: SASL LOGIN authentication failed: authentication failure
2020-01-06T15:16:44.440987beta postfix/smtpd[4683]: warning: unknown[139.219.8.185]: SASL LOGIN authentication failed: authentication failure
...
2020-01-06 23:48:40
117.34.118.44 attackspam
Unauthorized connection attempt detected from IP address 117.34.118.44 to port 1433 [J]
2020-01-06 23:58:02
101.108.121.40 attackbotsspam
Unauthorized connection attempt detected from IP address 101.108.121.40 to port 23 [T]
2020-01-07 00:11:25
113.85.63.231 attack
Unauthorized connection attempt detected from IP address 113.85.63.231 to port 23 [J]
2020-01-06 23:58:46
39.98.157.27 attackbotsspam
Unauthorized connection attempt detected from IP address 39.98.157.27 to port 167 [T]
2020-01-07 00:27:22
121.122.84.86 attackbotsspam
Unauthorized connection attempt detected from IP address 121.122.84.86 to port 4567 [J]
2020-01-07 00:07:12
91.243.237.121 attack
Unauthorized connection attempt detected from IP address 91.243.237.121 to port 80 [J]
2020-01-07 00:11:45
39.98.154.31 attack
Unauthorized connection attempt detected from IP address 39.98.154.31 to port 167 [T]
2020-01-07 00:27:35
185.209.0.71 attackbotsspam
Unauthorized connection attempt detected from IP address 185.209.0.71 to port 8092
2020-01-06 23:45:32
47.92.55.104 attackbotsspam
Unauthorized connection attempt detected from IP address 47.92.55.104 to port 167 [T]
2020-01-07 00:19:03
80.82.64.127 attackspam
Jan  6 13:31:27 h2177944 kernel: \[1512446.302922\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39508 PROTO=TCP SPT=8080 DPT=3601 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 13:31:27 h2177944 kernel: \[1512446.302934\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=39508 PROTO=TCP SPT=8080 DPT=3601 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 13:42:24 h2177944 kernel: \[1513103.323770\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=40434 PROTO=TCP SPT=8080 DPT=3525 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 13:42:24 h2177944 kernel: \[1513103.323783\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=40434 PROTO=TCP SPT=8080 DPT=3525 WINDOW=1024 RES=0x00 SYN URGP=0 
Jan  6 14:11:43 h2177944 kernel: \[1514861.485192\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=80.82.64.127 DST=85.214.117.9 LEN=40 T
2020-01-06 23:54:40
180.167.16.82 attackspambots
Unauthorized connection attempt detected from IP address 180.167.16.82 to port 22 [T]
2020-01-07 00:04:44
39.98.219.245 attackbotsspam
Unauthorized connection attempt detected from IP address 39.98.219.245 to port 167 [T]
2020-01-07 00:25:54
39.100.157.74 attackspam
Unauthorized connection attempt detected from IP address 39.100.157.74 to port 167 [T]
2020-01-07 00:21:28
42.116.89.143 attackspam
Unauthorized connection attempt detected from IP address 42.116.89.143 to port 23 [J]
2020-01-07 00:20:07

Recently Reported IPs

47.92.195.56 2606:4700:10::6816:1642 110.78.150.159 2606:4700:10::6816:4508
2606:4700:10::6816:1617 2606:4700:10::ac43:1358 2606:4700:10::6814:7182 141.141.121.121
237.109.37.64 203.28.2.227 166.39.169.12 224.25.32.67
121.196.161.232 2606:4700:10::6814:9924 2606:4700:10::6816:803 2606:4700:10::6814:9547
2606:4700:10::6816:4696 2606:4700:10::6816:1231 2606:4700:10::6816:3253 103.25.231.252