Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.16.242.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30519
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;107.16.242.62.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101900 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 19 18:55:23 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 62.242.16.107.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
** server can't find 62.242.16.107.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
85.208.109.221 attackspam
SSH bruteforce attack
2020-09-25 05:33:27
104.131.126.10 attack
Brute-force attempt banned
2020-09-25 05:30:35
189.33.175.6 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:05:34
139.199.165.189 attack
$f2bV_matches
2020-09-25 05:17:37
68.183.96.194 attackspam
SSH bruteforce attack
2020-09-25 05:36:25
128.199.29.118 attackspambots
Sep 24 23:19:33 ift sshd\[972\]: Failed password for root from 128.199.29.118 port 60562 ssh2Sep 24 23:23:49 ift sshd\[1664\]: Invalid user support from 128.199.29.118Sep 24 23:23:51 ift sshd\[1664\]: Failed password for invalid user support from 128.199.29.118 port 41278 ssh2Sep 24 23:28:02 ift sshd\[2283\]: Invalid user mike from 128.199.29.118Sep 24 23:28:04 ift sshd\[2283\]: Failed password for invalid user mike from 128.199.29.118 port 50224 ssh2
...
2020-09-25 05:22:17
201.122.212.30 attackspambots
$f2bV_matches
2020-09-25 05:04:26
144.34.221.254 attack
Invalid user zero from 144.34.221.254 port 47068
2020-09-25 05:16:30
68.183.120.37 attackbotsspam
Invalid user steam from 68.183.120.37 port 46346
2020-09-25 05:35:53
62.67.57.46 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:37:51
159.65.68.239 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:13:44
62.113.241.20 attackspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:37:16
150.136.164.130 attackbotsspam
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-25 05:15:43
213.189.34.18 attack
Total attacks: 2
2020-09-25 05:03:22
212.64.66.218 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-25 05:03:36

Recently Reported IPs

176.216.10.73 167.11.80.247 174.158.33.214 64.206.23.19
60.166.60.162 124.41.240.126 107.151.222.178 103.199.112.79
89.20.28.21 217.182.172.234 52.42.144.51 46.254.196.55
79.42.79.165 39.110.250.69 36.57.177.141 79.118.196.33
85.148.153.71 116.109.229.22 111.231.119.188 163.47.203.201