Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.194.157.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.194.157.164.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:12:47 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 164.157.194.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.157.194.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.204.84.252 attack
May 13 16:14:54 server sshd[8741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.84.252
May 13 16:14:57 server sshd[8741]: Failed password for invalid user abc1 from 129.204.84.252 port 35358 ssh2
May 13 16:19:29 server sshd[12586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.84.252
...
2020-05-14 04:13:31
193.29.13.125 attackspambots
May 13 14:32:19 vps691689 sshd[21673]: error: Received disconnect from 193.29.13.125 port 45740:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2020-05-14 03:38:38
122.55.5.146 attack
Unauthorized connection attempt from IP address 122.55.5.146 on Port 445(SMB)
2020-05-14 03:52:30
106.13.78.171 attackspam
Invalid user www from 106.13.78.171 port 56980
2020-05-14 04:03:46
51.89.200.126 attack
Automatic report - XMLRPC Attack
2020-05-14 03:46:29
142.93.6.79 attackbots
xmlrpc attack
2020-05-14 03:55:47
5.183.131.221 attack
Received: from 3WTlqM3rR.61MwP2Ip61Jl.6fvOWane.B ([51.75.103.101]) 
 0
Date: Wed, 13 May 2020 08:53:01 -0000
From domain ->effelax.com       5.183.131.221
Subject: 8_Must-Haves During The Coronavirus Pandemic
Reply-To: " Smart Living Tips "  
 effelax.com   5.183.131.221
2020-05-14 04:05:56
106.12.196.237 attackbotsspam
" "
2020-05-14 03:42:59
121.204.172.132 attackbots
May 13 15:46:10 [host] sshd[13544]: Invalid user p
May 13 15:46:10 [host] sshd[13544]: pam_unix(sshd:
May 13 15:46:12 [host] sshd[13544]: Failed passwor
2020-05-14 03:56:34
49.247.134.133 attack
ssh brute force
2020-05-14 04:01:04
62.210.219.124 attackbotsspam
20 attempts against mh-ssh on cloud
2020-05-14 03:47:35
2.139.159.96 attack
Unauthorized connection attempt from IP address 2.139.159.96 on Port 445(SMB)
2020-05-14 04:14:23
51.91.156.199 attackbots
SSH Brute-Force reported by Fail2Ban
2020-05-14 03:44:48
159.65.145.119 attackbots
Postfix SMTP rejection
2020-05-14 03:45:16
8.247.210.254 attackspam
Microsoft Edge App-v vbs command
2020-05-14 04:14:06

Recently Reported IPs

85.32.232.247 212.90.82.20 168.142.179.136 31.242.180.143
151.40.177.175 53.16.85.154 249.134.66.17 26.218.82.201
247.8.43.119 12.2.246.5 156.177.77.53 164.67.142.19
211.254.75.151 14.138.249.135 91.43.104.234 199.167.10.82
243.234.21.158 255.62.215.15 94.47.243.205 221.180.69.232