Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.166.42.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.166.42.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:17:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
45.42.166.222.in-addr.arpa domain name pointer cm222-166-42-45.hkcable.com.hk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.42.166.222.in-addr.arpa	name = cm222-166-42-45.hkcable.com.hk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.44.18.114 attackspambots
[ES hit] Tried to deliver spam.
2019-06-23 03:38:20
94.158.22.123 attackspam
4.201.441,44-03/02 concatform PostRequest-Spammer scoring: Lusaka01
2019-06-23 03:56:08
191.53.193.226 attackbotsspam
Jun 22 10:38:01 web1 postfix/smtpd[21223]: warning: unknown[191.53.193.226]: SASL PLAIN authentication failed: authentication failure
...
2019-06-23 03:59:27
209.97.142.250 attackspambots
$f2bV_matches
2019-06-23 03:10:12
91.65.119.90 attack
C1,WP GET /wp-login.php
2019-06-23 03:06:59
185.244.25.154 attackbotsspam
SSH Bruteforce
2019-06-23 03:48:06
35.225.72.122 attackspambots
RDP Bruteforce
2019-06-23 03:50:47
60.250.23.105 attackbotsspam
Multiple SSH auth failures recorded by fail2ban
2019-06-23 03:44:52
89.252.172.184 attack
Postfix RBL failed
2019-06-23 03:51:16
35.192.14.162 attackspambots
RDP Bruteforce
2019-06-23 03:57:40
49.148.210.24 attackspambots
445/tcp
[2019-06-22]1pkt
2019-06-23 03:10:57
187.120.132.189 attackbots
failed_logins
2019-06-23 03:42:42
77.85.168.253 attackspam
SPF Fail sender not permitted to send mail for @btc-net.bg / Sent Mail to target address hacked/leaked from Planet3DNow.de
2019-06-23 03:53:36
5.188.216.66 attackbotsspam
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="  
2019-06-23 03:52:49
193.188.22.112 attack
Many RDP login attempts detected by IDS script
2019-06-23 03:57:05

Recently Reported IPs

38.175.91.159 15.57.39.96 190.249.143.171 193.97.13.212
30.223.137.8 82.193.80.136 130.42.19.155 206.140.196.246
130.112.122.206 57.100.118.6 222.213.96.125 32.249.183.175
49.201.21.212 116.60.74.217 160.180.219.192 6.230.83.112
101.75.246.78 14.71.86.164 22.140.234.82 80.185.82.193