Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 39.134.66.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;39.134.66.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:52:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 164.66.134.39.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.66.134.39.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.140 attackbots
2020-04-12T01:21:37.042512xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-04-12T01:21:30.290576xentho-1 sshd[209078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
2020-04-12T01:21:32.065726xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-04-12T01:21:37.042512xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-04-12T01:21:41.148756xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-04-12T01:21:30.290576xentho-1 sshd[209078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
2020-04-12T01:21:32.065726xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-04-12T01:21:37.042512xentho-1 sshd[209078]: Failed password for root from 222.186.175.140 port 19820 ssh2
2020-0
...
2020-04-12 13:23:32
31.171.71.74 attackspam
Brute force attempt
2020-04-12 13:35:14
117.121.38.28 attack
Apr 12 10:53:01 webhost01 sshd[1133]: Failed password for root from 117.121.38.28 port 34024 ssh2
...
2020-04-12 13:08:09
83.212.75.119 attack
Apr 12 07:44:49 www sshd\[149630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.212.75.119  user=root
Apr 12 07:44:51 www sshd\[149630\]: Failed password for root from 83.212.75.119 port 55820 ssh2
Apr 12 07:47:18 www sshd\[149647\]: Invalid user kosiorska from 83.212.75.119
...
2020-04-12 13:00:03
167.99.66.193 attackbots
Apr 12 06:37:44 ewelt sshd[29201]: Failed password for invalid user spotlight from 167.99.66.193 port 35935 ssh2
Apr 12 06:41:04 ewelt sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193  user=root
Apr 12 06:41:06 ewelt sshd[29469]: Failed password for root from 167.99.66.193 port 34642 ssh2
Apr 12 06:44:21 ewelt sshd[29616]: Invalid user pass from 167.99.66.193 port 33346
...
2020-04-12 13:36:48
14.18.107.61 attack
Invalid user odoo from 14.18.107.61 port 38886
2020-04-12 13:32:42
147.203.238.18 attackspambots
04/12/2020-01:22:46.054716 147.203.238.18 Protocol: 17 GPL SNMP public access udp
2020-04-12 13:30:22
122.228.208.113 attackbots
04/11/2020-23:57:23.492165 122.228.208.113 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-12 13:17:33
141.98.81.138 attackbotsspam
Apr 12 05:56:52 debian64 sshd[17333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.138 
Apr 12 05:56:54 debian64 sshd[17333]: Failed password for invalid user admin from 141.98.81.138 port 61298 ssh2
...
2020-04-12 13:38:40
77.159.249.91 attackbots
Invalid user test from 77.159.249.91 port 38205
2020-04-12 13:11:53
192.3.139.56 attack
Apr 12 06:58:42 meumeu sshd[5984]: Failed password for root from 192.3.139.56 port 33848 ssh2
Apr 12 07:02:21 meumeu sshd[6908]: Failed password for root from 192.3.139.56 port 41544 ssh2
...
2020-04-12 13:19:29
49.233.142.45 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 1433[TCP]
2020-04-12 13:23:06
103.136.40.15 attackspam
Invalid user file from 103.136.40.15 port 42042
2020-04-12 13:27:03
165.22.77.163 attackspam
fail2ban
2020-04-12 13:27:29
213.32.67.160 attackbotsspam
Apr 12 05:04:08 scw-6657dc sshd[28006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.67.160  user=mysql
Apr 12 05:04:08 scw-6657dc sshd[28006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.67.160  user=mysql
Apr 12 05:04:11 scw-6657dc sshd[28006]: Failed password for mysql from 213.32.67.160 port 33718 ssh2
...
2020-04-12 13:16:15

Recently Reported IPs

83.35.134.33 57.89.200.249 30.130.147.252 44.162.251.252
38.84.58.178 38.158.160.98 64.155.84.126 211.40.90.176
3.223.218.41 130.95.158.24 174.82.146.152 8.194.98.43
222.229.255.253 108.219.165.163 19.23.98.57 26.182.31.48
107.252.0.78 212.28.144.175 51.103.163.121 245.84.90.210