Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.166.170.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.166.170.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:51:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 104.170.166.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.170.166.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.95.75.86 attackspambots
445/tcp
[2019-07-11]1pkt
2019-07-11 18:48:54
187.109.55.43 attack
$f2bV_matches
2019-07-11 19:06:37
116.4.97.247 attack
DATE:2019-07-11_08:47:34, IP:116.4.97.247, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-11 18:28:46
180.117.112.42 attack
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:59 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.117.112.42
Jul 11 17:42:57 itv-usvr-01 sshd[29790]: Invalid user admin from 180.117.112.42
Jul 11 17:42:59 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
Jul 11 17:43:01 itv-usvr-01 sshd[29790]: Failed password for invalid user admin from 180.117.112.42 port 36039 ssh2
2019-07-11 19:18:32
201.235.139.196 attackspambots
23/tcp
[2019-07-11]1pkt
2019-07-11 19:20:35
102.165.35.92 attack
Lines containing failures of 102.165.35.92
Jul 10 21:08:05 hvs sshd[25757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.165.35.92  user=r.r
Jul 10 21:08:08 hvs sshd[25757]: Failed password for r.r from 102.165.35.92 port 1104 ssh2
Jul 10 21:08:17 hvs sshd[25757]: Failed password for r.r from 102.165.35.92 port 1104 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.165.35.92
2019-07-11 18:37:33
120.35.189.180 attackspam
Jul  9 12:52:27 rigel postfix/smtpd[18475]: warning: hostname 180.189.35.120.broad.zz.fj.dynamic.163data.com.cn does not resolve to address 120.35.189.180: Name or service not known
Jul  9 12:52:27 rigel postfix/smtpd[18475]: connect from unknown[120.35.189.180]
Jul  9 12:52:28 rigel postfix/smtpd[18154]: warning: hostname 180.189.35.120.broad.zz.fj.dynamic.163data.com.cn does not resolve to address 120.35.189.180: Name or service not known
Jul  9 12:52:28 rigel postfix/smtpd[18154]: connect from unknown[120.35.189.180]
Jul  9 12:52:28 rigel postfix/smtpd[18475]: lost connection after CONNECT from unknown[120.35.189.180]
Jul  9 12:52:28 rigel postfix/smtpd[18475]: disconnect from unknown[120.35.189.180]
Jul  9 12:52:32 rigel postfix/smtpd[18154]: warning: unknown[120.35.189.180]: SASL LOGIN authentication failed: authentication failure
Jul  9 12:52:33 rigel postfix/smtpd[18154]: lost connection after AUTH from unknown[120.35.189.180]
Jul  9 12:52:33 rigel postfix/smtpd[........
-------------------------------
2019-07-11 18:38:55
134.209.214.245 attackbotsspam
Jul  5 04:30:37 localhost postfix/smtpd[13391]: lost connection after eclipseT from unknown[134.209.214.245]
Jul x@x
Jul  5 04:30:37 localhost postfix/smtpd[13392]: lost connection after eclipseT from unknown[134.209.214.245]
Jul  5 04:53:26 localhost postfix/smtpd[19374]: lost connection after eclipseT from unknown[134.209.214.245]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.209.214.245
2019-07-11 18:18:20
34.87.119.20 attackbotsspam
Invalid user src from 34.87.119.20 port 42020
2019-07-11 18:36:33
174.138.56.93 attackbots
Jul 11 13:27:31 rpi sshd[20528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.56.93 
Jul 11 13:27:33 rpi sshd[20528]: Failed password for invalid user ch from 174.138.56.93 port 40430 ssh2
2019-07-11 19:29:03
175.161.59.56 attackbotsspam
Caught in portsentry honeypot
2019-07-11 18:28:19
113.237.169.56 attackbotsspam
23/tcp
[2019-07-11]1pkt
2019-07-11 19:26:21
202.54.73.229 attackspam
Jul 11 05:37:07 web sshd\[32554\]: Invalid user rocky from 202.54.73.229
Jul 11 05:37:07 web sshd\[32554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.54.73.229 
Jul 11 05:37:08 web sshd\[32554\]: Failed password for invalid user rocky from 202.54.73.229 port 52944 ssh2
Jul 11 05:45:53 web sshd\[32601\]: Invalid user posp from 202.54.73.229
Jul 11 05:45:53 web sshd\[32601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.54.73.229 
...
2019-07-11 18:39:58
77.247.110.188 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 19:24:55
78.167.244.35 attackbots
Caught in portsentry honeypot
2019-07-11 18:41:47

Recently Reported IPs

174.56.57.244 210.238.118.217 195.69.69.230 116.251.224.18
29.99.224.134 216.91.2.208 233.240.89.42 206.55.22.89
204.96.62.132 199.60.233.240 167.9.96.154 75.224.96.149
130.174.96.122 203.62.124.104 16.118.250.177 212.49.122.206
94.93.252.91 110.3.71.238 135.149.108.209 60.235.50.133