Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.222.166.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.222.166.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 05:37:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 139.166.222.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.222.166.139.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
167.114.115.33 attackbots
Invalid user yhf from 167.114.115.33 port 47642
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=33.ip-167-114-115.net
Invalid user yhf from 167.114.115.33 port 47642
Failed password for invalid user yhf from 167.114.115.33 port 47642 ssh2
Invalid user selim from 167.114.115.33 port 33694
2020-07-19 01:05:33
178.16.175.146 attackbotsspam
Brute-force attempt banned
2020-07-19 01:33:14
182.254.172.63 attackbotsspam
Invalid user 22 from 182.254.172.63 port 46392
2020-07-19 01:03:18
170.210.121.66 attackspambots
*Port Scan* detected from 170.210.121.66 (AR/Argentina/Buenos Aires F.D./Buenos Aires/-). 4 hits in the last 35 seconds
2020-07-19 01:34:04
58.234.45.190 attack
Invalid user lhz from 58.234.45.190 port 54138
2020-07-19 01:22:39
195.122.226.164 attackspambots
Jul 18 17:15:03 l02a sshd[10599]: Invalid user ghost from 195.122.226.164
Jul 18 17:15:03 l02a sshd[10599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.122.226.164 
Jul 18 17:15:03 l02a sshd[10599]: Invalid user ghost from 195.122.226.164
Jul 18 17:15:05 l02a sshd[10599]: Failed password for invalid user ghost from 195.122.226.164 port 6571 ssh2
2020-07-19 00:57:57
113.125.121.201 attackbots
Invalid user kevin from 113.125.121.201 port 60584
2020-07-19 01:15:04
71.45.233.98 attack
Invalid user ts3 from 71.45.233.98 port 64327
2020-07-19 01:20:33
202.152.27.10 attack
Invalid user marx from 202.152.27.10 port 51160
2020-07-19 01:29:45
206.189.88.253 attack
scans once in preceeding hours on the ports (in chronological order) 7189 resulting in total of 5 scans from 206.189.0.0/16 block.
2020-07-19 01:29:31
192.81.209.72 attack
Invalid user seb from 192.81.209.72 port 58570
2020-07-19 00:59:02
139.59.46.243 attackspambots
Jul 18 18:25:46 mellenthin sshd[16820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243
Jul 18 18:25:48 mellenthin sshd[16820]: Failed password for invalid user shift from 139.59.46.243 port 59842 ssh2
2020-07-19 01:36:23
165.227.214.37 attackbotsspam
Jul 18 09:27:46 Host-KLAX-C sshd[506]: Invalid user service from 165.227.214.37 port 49582
...
2020-07-19 01:05:58
106.13.144.8 attackspambots
Invalid user mcftp from 106.13.144.8 port 56572
2020-07-19 01:18:16
150.136.21.93 attackbotsspam
Invalid user hadoop from 150.136.21.93 port 34980
2020-07-19 01:07:19

Recently Reported IPs

78.60.177.206 210.96.111.31 14.203.184.122 227.6.74.213
217.247.176.88 170.132.232.129 236.24.103.31 235.52.157.229
46.9.177.148 52.56.10.132 177.10.56.234 225.204.74.100
200.13.6.18 24.214.4.167 221.253.192.166 13.125.183.33
239.183.230.210 169.37.76.153 194.213.128.130 212.83.131.37