Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.104.208.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.104.208.161.		IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 18:43:16 CST 2022
;; MSG SIZE  rcvd: 108
Host info
161.208.104.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
161.208.104.116.in-addr.arpa	name = dynamic-adsl.viettel.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.202.8.55 attackbotsspam
k+ssh-bruteforce
2020-03-28 18:03:48
192.144.179.249 attackspambots
Invalid user icd from 192.144.179.249 port 41632
2020-03-28 18:00:07
194.26.29.110 attackbotsspam
Excessive Port-Scanning
2020-03-28 18:20:52
189.54.51.236 attackspambots
Telnet Server BruteForce Attack
2020-03-28 18:07:04
31.18.253.199 attack
Brute force VPN server
2020-03-28 18:05:19
87.251.74.10 attackspam
Port scan: Attack repeated for 24 hours
2020-03-28 18:44:17
103.120.224.222 attackspambots
no
2020-03-28 18:11:15
125.212.202.179 attackbotsspam
Mar 28 10:34:29 * sshd[18023]: Failed password for root from 125.212.202.179 port 56635 ssh2
2020-03-28 17:54:16
51.15.87.74 attackbots
Invalid user sima from 51.15.87.74 port 60530
2020-03-28 17:59:39
106.13.136.3 attack
(sshd) Failed SSH login from 106.13.136.3 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 05:27:56 s1 sshd[27861]: Invalid user fgu from 106.13.136.3 port 48922
Mar 28 05:27:58 s1 sshd[27861]: Failed password for invalid user fgu from 106.13.136.3 port 48922 ssh2
Mar 28 05:43:07 s1 sshd[28145]: Invalid user xis from 106.13.136.3 port 35746
Mar 28 05:43:09 s1 sshd[28145]: Failed password for invalid user xis from 106.13.136.3 port 35746 ssh2
Mar 28 05:47:09 s1 sshd[28249]: Invalid user mbp from 106.13.136.3 port 33100
2020-03-28 18:09:33
194.26.29.106 attackspam
03/28/2020-03:12:33.543777 194.26.29.106 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-28 18:21:17
162.243.130.234 attackbotsspam
Port probing on unauthorized port 9200
2020-03-28 18:35:09
162.243.184.249 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-03-28 18:14:32
92.63.196.7 attack
TCP scanned port list, 3402, 3399, 3400, 3398
2020-03-28 18:40:05
185.176.222.99 attack
Port scan on 4 port(s): 3350 3370 3392 3393
2020-03-28 18:26:12

Recently Reported IPs

116.104.217.0 116.104.244.114 116.104.199.176 116.104.218.204
116.104.210.21 114.104.141.61 116.104.30.158 116.104.210.119
116.104.33.193 116.104.244.154 116.104.38.37 116.104.37.246
116.104.38.39 116.104.38.85 116.104.42.45 116.104.61.11
114.104.141.62 116.104.63.100 116.104.61.56 116.104.66.144