Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.100.135.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.100.135.242.		IN	A

;; AUTHORITY SECTION:
.			359	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 18:42:39 CST 2022
;; MSG SIZE  rcvd: 108
Host info
242.135.100.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.135.100.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.176.17 attackspam
Sep  2 12:09:21 mail sshd\[7410\]: Failed password for invalid user mju76yhn from 106.12.176.17 port 54588 ssh2
Sep  2 12:13:57 mail sshd\[8378\]: Invalid user dashboard from 106.12.176.17 port 37034
Sep  2 12:13:57 mail sshd\[8378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.17
Sep  2 12:13:58 mail sshd\[8378\]: Failed password for invalid user dashboard from 106.12.176.17 port 37034 ssh2
Sep  2 12:19:00 mail sshd\[9264\]: Invalid user blaze123 from 106.12.176.17 port 47712
2019-09-02 19:36:01
49.130.51.2 attackspambots
Sep  2 04:04:06 l01 sshd[224467]: Invalid user admin from 49.130.51.2
Sep  2 04:04:06 l01 sshd[224467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.130.51.2 
Sep  2 04:04:08 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:10 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:12 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:14 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:16 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:18 l01 sshd[224467]: Failed password for invalid user admin from 49.130.51.2 port 64907 ssh2
Sep  2 04:04:18 l01 sshd[224467]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.130.51.2 


........
----------------------------------------------
2019-09-02 19:45:55
118.100.171.181 attackbots
81/tcp
[2019-09-02]1pkt
2019-09-02 20:04:35
86.108.87.51 attackspam
Telnet Server BruteForce Attack
2019-09-02 19:33:19
157.230.13.28 attackbots
Sep  2 07:03:35 www sshd\[50615\]: Invalid user katie from 157.230.13.28Sep  2 07:03:37 www sshd\[50615\]: Failed password for invalid user katie from 157.230.13.28 port 48482 ssh2Sep  2 07:07:09 www sshd\[50805\]: Invalid user pentaho from 157.230.13.28
...
2019-09-02 19:57:17
118.25.133.121 attackspambots
Sep  2 08:07:05 legacy sshd[1477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121
Sep  2 08:07:08 legacy sshd[1477]: Failed password for invalid user hath from 118.25.133.121 port 46924 ssh2
Sep  2 08:10:39 legacy sshd[1533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121
...
2019-09-02 20:06:59
177.32.64.189 attackbots
Sep  1 23:30:38 web1 sshd\[31145\]: Invalid user reigo from 177.32.64.189
Sep  1 23:30:38 web1 sshd\[31145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.64.189
Sep  1 23:30:40 web1 sshd\[31145\]: Failed password for invalid user reigo from 177.32.64.189 port 45883 ssh2
Sep  1 23:36:09 web1 sshd\[31667\]: Invalid user zhao from 177.32.64.189
Sep  1 23:36:09 web1 sshd\[31667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.32.64.189
2019-09-02 19:59:49
218.25.161.189 attackspam
Sep  2 10:47:02 saschabauer sshd[28027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.25.161.189
Sep  2 10:47:03 saschabauer sshd[28027]: Failed password for invalid user shree from 218.25.161.189 port 13234 ssh2
2019-09-02 19:31:42
51.75.24.200 attackspambots
Sep  1 22:26:32 hcbb sshd\[22806\]: Invalid user appserver from 51.75.24.200
Sep  1 22:26:32 hcbb sshd\[22806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-75-24.eu
Sep  1 22:26:34 hcbb sshd\[22806\]: Failed password for invalid user appserver from 51.75.24.200 port 33538 ssh2
Sep  1 22:30:19 hcbb sshd\[23117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.ip-51-75-24.eu  user=root
Sep  1 22:30:21 hcbb sshd\[23117\]: Failed password for root from 51.75.24.200 port 48516 ssh2
2019-09-02 20:02:44
170.130.126.214 attack
ECShop Remote Code Execution Vulnerability
2019-09-02 20:09:47
27.33.191.36 attackbots
23/tcp
[2019-09-02]1pkt
2019-09-02 19:37:47
51.254.205.6 attack
Sep  2 12:39:41 dedicated sshd[7440]: Invalid user rolmedo from 51.254.205.6 port 53960
2019-09-02 19:05:20
14.204.136.125 attackbots
Sep  2 09:19:25 m3061 sshd[2484]: Invalid user sjnystro from 14.204.136.125
Sep  2 09:19:25 m3061 sshd[2484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.204.136.125


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.204.136.125
2019-09-02 19:49:10
101.89.166.204 attackspambots
Sep  2 06:21:01 MK-Soft-VM3 sshd\[1764\]: Invalid user matias from 101.89.166.204 port 51194
Sep  2 06:21:01 MK-Soft-VM3 sshd\[1764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.166.204
Sep  2 06:21:03 MK-Soft-VM3 sshd\[1764\]: Failed password for invalid user matias from 101.89.166.204 port 51194 ssh2
...
2019-09-02 19:48:13
122.160.3.170 attack
81/tcp
[2019-09-02]1pkt
2019-09-02 19:57:45

Recently Reported IPs

116.100.160.100 116.100.191.155 116.100.178.8 114.104.141.32
116.100.254.172 116.100.35.64 116.100.135.183 116.100.203.99
116.100.7.29 116.100.80.170 116.101.130.30 116.101.106.111
116.101.134.168 116.100.47.26 116.101.102.111 116.101.105.58
116.101.139.46 114.104.141.35 116.101.143.1 116.101.150.165