Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.173.180.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32770
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.173.180.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 21:55:38 CST 2025
;; MSG SIZE  rcvd: 107
Host info
164.180.173.99.in-addr.arpa domain name pointer 99-173-180-164.lightspeed.nsvltn.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.180.173.99.in-addr.arpa	name = 99-173-180-164.lightspeed.nsvltn.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
164.125.149.197 attackbotsspam
May 27 14:17:34 pi sshd[26969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197 
May 27 14:17:36 pi sshd[26969]: Failed password for invalid user admin from 164.125.149.197 port 56408 ssh2
2020-07-24 06:29:29
81.147.115.159 attack
Jul 23 16:19:38 NPSTNNYC01T sshd[13685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.147.115.159
Jul 23 16:19:38 NPSTNNYC01T sshd[13689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.147.115.159
Jul 23 16:19:40 NPSTNNYC01T sshd[13685]: Failed password for invalid user pi from 81.147.115.159 port 37014 ssh2
Jul 23 16:19:40 NPSTNNYC01T sshd[13689]: Failed password for invalid user pi from 81.147.115.159 port 37024 ssh2
...
2020-07-24 05:54:25
164.163.23.19 attackbots
May 11 20:27:18 pi sshd[2887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.23.19 
May 11 20:27:21 pi sshd[2887]: Failed password for invalid user cssserver from 164.163.23.19 port 47730 ssh2
2020-07-24 05:53:41
66.113.188.136 attackbots
IP 66.113.188.136 attacked honeypot on port: 22 at 7/23/2020 2:25:02 PM
2020-07-24 05:53:03
61.148.206.158 attackbots
Repeated RDP login failures. Last user: Sistemas
2020-07-24 06:04:08
164.132.51.91 attackbots
May 14 21:47:49 pi sshd[19725]: Failed password for root from 164.132.51.91 port 53920 ssh2
May 14 21:47:53 pi sshd[19725]: Failed password for root from 164.132.51.91 port 53920 ssh2
2020-07-24 06:13:28
122.54.87.194 attackspambots
Repeated RDP login failures. Last user: Administrator
2020-07-24 05:59:59
104.198.228.2 attackspam
Invalid user fy from 104.198.228.2 port 36304
2020-07-24 06:25:00
129.211.13.226 attackspambots
2020-07-23T23:21:24.796307sd-86998 sshd[16508]: Invalid user zhanghw from 129.211.13.226 port 59372
2020-07-23T23:21:24.798726sd-86998 sshd[16508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.13.226
2020-07-23T23:21:24.796307sd-86998 sshd[16508]: Invalid user zhanghw from 129.211.13.226 port 59372
2020-07-23T23:21:27.176443sd-86998 sshd[16508]: Failed password for invalid user zhanghw from 129.211.13.226 port 59372 ssh2
2020-07-23T23:26:09.338540sd-86998 sshd[17067]: Invalid user centos from 129.211.13.226 port 55502
...
2020-07-24 06:23:30
164.132.41.67 attackbotsspam
SSH Invalid Login
2020-07-24 06:23:17
120.31.201.11 attack
Repeated RDP login failures. Last user: Mike
2020-07-24 06:07:10
163.44.153.96 attackbotsspam
Apr 29 16:20:32 pi sshd[31095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.153.96 
Apr 29 16:20:34 pi sshd[31095]: Failed password for invalid user admin from 163.44.153.96 port 45928 ssh2
Apr 29 16:24:26 pi sshd[32303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.153.96
2020-07-24 06:30:45
186.153.124.126 attack
Repeated RDP login failures. Last user: admin
2020-07-24 05:57:09
14.63.221.100 attack
SSH Invalid Login
2020-07-24 06:21:14
164.132.225.250 attack
SSH Invalid Login
2020-07-24 06:22:56

Recently Reported IPs

117.90.85.203 150.2.62.206 208.49.34.58 134.123.74.177
241.246.185.155 191.178.191.90 119.31.195.141 120.125.240.232
60.173.187.146 77.45.1.65 164.117.213.191 77.170.54.122
12.190.215.28 222.209.45.60 174.250.128.177 178.195.208.236
59.78.129.161 116.149.36.100 28.1.23.71 214.224.29.221