Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shawnee

Region: Oklahoma

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.139.159.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59173
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.139.159.161.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023040201 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 03 08:15:45 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 161.159.139.66.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.159.139.66.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.6.172 attackspam
xmlrpc attack
2020-04-06 12:00:44
92.46.40.110 attackbotsspam
leo_www
2020-04-06 09:27:50
87.116.178.57 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 05-04-2020 22:35:15.
2020-04-06 09:36:00
222.222.141.171 attackbotsspam
Apr  6 00:20:04 legacy sshd[24393]: Failed password for root from 222.222.141.171 port 38367 ssh2
Apr  6 00:23:46 legacy sshd[24555]: Failed password for root from 222.222.141.171 port 39308 ssh2
...
2020-04-06 09:27:01
49.207.135.180 attackbots
inbound access attempt
2020-04-06 12:01:36
222.186.31.83 attackspam
Apr  6 01:43:11 marvibiene sshd[39916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Apr  6 01:43:13 marvibiene sshd[39916]: Failed password for root from 222.186.31.83 port 20020 ssh2
Apr  6 01:43:15 marvibiene sshd[39916]: Failed password for root from 222.186.31.83 port 20020 ssh2
Apr  6 01:43:11 marvibiene sshd[39916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Apr  6 01:43:13 marvibiene sshd[39916]: Failed password for root from 222.186.31.83 port 20020 ssh2
Apr  6 01:43:15 marvibiene sshd[39916]: Failed password for root from 222.186.31.83 port 20020 ssh2
...
2020-04-06 09:45:18
61.218.122.198 attackspambots
" "
2020-04-06 09:20:18
68.183.102.246 attackbots
2020-04-06T01:03:21.501683shield sshd\[11640\]: Invalid user ubuntu from 68.183.102.246 port 57134
2020-04-06T01:03:21.505407shield sshd\[11640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bjcontrol.com.br
2020-04-06T01:03:23.959036shield sshd\[11640\]: Failed password for invalid user ubuntu from 68.183.102.246 port 57134 ssh2
2020-04-06T01:05:06.015899shield sshd\[12226\]: Invalid user sysadmin from 68.183.102.246 port 48902
2020-04-06T01:05:06.019362shield sshd\[12226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bjcontrol.com.br
2020-04-06 09:31:49
162.243.134.30 attackbots
firewall-block, port(s): 65197/tcp
2020-04-06 09:26:48
62.234.95.136 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-04-06 09:24:39
140.143.127.179 attackbotsspam
Apr  6 01:09:02 ks10 sshd[2748484]: Failed password for root from 140.143.127.179 port 58146 ssh2
...
2020-04-06 09:25:42
51.178.2.81 attackbotsspam
$f2bV_matches
2020-04-06 09:26:20
162.242.251.16 attack
Trolling for resource vulnerabilities
2020-04-06 09:34:33
120.92.43.106 attackbots
$f2bV_matches
2020-04-06 09:36:46
150.136.62.61 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-04-06 09:24:05

Recently Reported IPs

204.212.204.2 28.130.69.103 161.62.223.49 233.219.104.7
153.49.186.42 220.220.200.27 222.100.198.102 104.144.130.205
201.72.136.163 176.88.85.13 38.142.211.51 13.84.39.204
186.65.114.166 241.213.77.41 65.61.141.58 67.168.51.134
112.99.132.85 21.149.28.92 226.100.105.23 86.157.155.23