Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.137.163.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43454
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.137.163.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:15:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 161.163.137.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.163.137.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.209.249.204 attackspam
2020-09-05T17:12:07.000329mail.broermann.family sshd[14352]: Invalid user oracle from 134.209.249.204 port 49104
2020-09-05T17:12:09.416657mail.broermann.family sshd[14352]: Failed password for invalid user oracle from 134.209.249.204 port 49104 ssh2
2020-09-05T17:12:24.892407mail.broermann.family sshd[14356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.249.204  user=root
2020-09-05T17:12:27.303615mail.broermann.family sshd[14356]: Failed password for root from 134.209.249.204 port 41634 ssh2
2020-09-05T17:12:41.715412mail.broermann.family sshd[14360]: Invalid user postgres from 134.209.249.204 port 34160
...
2020-09-06 00:03:44
192.241.233.90 attack
Lines containing failures of 192.241.233.90
2020-09-05 11:52:42 SMTP protocol synchronization error (input sent whostnamehout wahostnameing for greeting): rejected connection from H=[192.241.233.90] input="EHLO zg-0823b-161
"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=192.241.233.90
2020-09-06 00:31:36
143.202.12.42 attackbots
 TCP (SYN) 143.202.12.42:49639 -> port 1433, len 40
2020-09-06 00:21:51
60.223.235.71 attackbotsspam
" "
2020-09-06 00:21:34
51.79.53.139 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-09-06 00:11:46
222.186.30.57 attack
Sep  5 17:52:36 abendstille sshd\[29343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
Sep  5 17:52:38 abendstille sshd\[29343\]: Failed password for root from 222.186.30.57 port 19296 ssh2
Sep  5 17:52:40 abendstille sshd\[29343\]: Failed password for root from 222.186.30.57 port 19296 ssh2
Sep  5 17:52:42 abendstille sshd\[29343\]: Failed password for root from 222.186.30.57 port 19296 ssh2
Sep  5 17:52:47 abendstille sshd\[29453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.57  user=root
...
2020-09-06 00:07:39
200.117.185.116 attackspambots
Honeypot attack, port: 445, PTR: host116.200-117-185.telecom.net.ar.
2020-09-06 00:33:55
106.116.118.89 attack
Sep  5 09:23:31 server sshd[46691]: Failed password for root from 106.116.118.89 port 47252 ssh2
Sep  5 09:27:50 server sshd[48605]: Failed password for root from 106.116.118.89 port 45788 ssh2
Sep  5 09:45:20 server sshd[56992]: Failed password for root from 106.116.118.89 port 39942 ssh2
2020-09-06 00:26:57
207.58.189.248 attack
Return-Path: 
Received: from tnpkovernights.com (207.58.189.248.tnpkovernight.com. [207.58.189.248])
        by mx.google.com with ESMTPS id d22si3601345qka.209.2020.09.03.20.16.42
        for <>
        (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128);
        Thu, 03 Sep 2020 20:16:42 -0700 (PDT)
Received-SPF: neutral (google.com: 207.58.189.248 is neither permitted nor denied by best guess record for domain of return@restojob.lp) client-ip=207.58.189.248;
Authentication-Results: mx.google.com;
       dkim=pass header.i=@tnpkovernight.com header.s=key1 header.b=w0LdF1rj;
       spf=neutral (google.com: 207.58.189.248 is neither permitted nor denied by best guess record for domain of return@restojob.lp) smtp.mailfrom=return@restojob.lp
2020-09-06 00:00:18
5.102.20.118 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-06 00:32:20
140.143.211.45 attack
Invalid user link from 140.143.211.45 port 46424
2020-09-06 00:31:20
95.163.196.191 attackspambots
Sep  5 18:13:06 itv-usvr-02 sshd[2109]: Invalid user ubuntu from 95.163.196.191 port 33440
Sep  5 18:13:06 itv-usvr-02 sshd[2109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.196.191
Sep  5 18:13:06 itv-usvr-02 sshd[2109]: Invalid user ubuntu from 95.163.196.191 port 33440
Sep  5 18:13:09 itv-usvr-02 sshd[2109]: Failed password for invalid user ubuntu from 95.163.196.191 port 33440 ssh2
Sep  5 18:20:03 itv-usvr-02 sshd[2318]: Invalid user Test from 95.163.196.191 port 40766
2020-09-05 23:46:38
170.130.63.95 attack
Registration form abuse
2020-09-06 00:08:47
93.118.119.114 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 00:04:03
89.179.72.201 attack
20/9/4@13:27:15: FAIL: Alarm-Network address from=89.179.72.201
20/9/4@13:27:15: FAIL: Alarm-Network address from=89.179.72.201
...
2020-09-06 00:04:26

Recently Reported IPs

14.211.215.85 195.9.122.85 93.182.178.217 127.209.145.142
167.136.48.147 42.104.178.8 218.139.42.175 221.209.191.45
130.113.143.162 86.18.41.155 26.230.221.177 104.165.111.37
127.241.162.177 123.34.166.220 193.175.110.88 66.164.248.51
207.33.133.47 169.122.152.49 211.198.127.245 231.145.128.78