Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: Hanoi

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: Viettel Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.104.69.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11768
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.104.69.169.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 12:44:42 CST 2019
;; MSG SIZE  rcvd: 118

Host info
169.69.104.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
169.69.104.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
36.225.203.41 attackspambots
Repeated RDP login failures. Last user: Guest
2020-06-11 20:57:53
116.203.41.67 attack
116.203.41.67 - - [11/Jun/2020:14:14:25 +0200] "GET /wp-login.php HTTP/1.1" 200 6183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
116.203.41.67 - - [11/Jun/2020:14:14:26 +0200] "POST /wp-login.php HTTP/1.1" 200 6434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
116.203.41.67 - - [11/Jun/2020:14:14:27 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-11 21:09:44
80.242.124.65 attack
Repeated RDP login failures. Last user: administrator
2020-06-11 20:57:21
91.186.9.196 attack
Repeated RDP login failures. Last user: administrator
2020-06-11 20:56:46
107.173.54.14 attackspambots
Honeypot attack, port: 445, PTR: 107-173-54-14-host.colocrossing.com.
2020-06-11 21:02:24
45.147.197.20 attackbots
RUSSIAN SCAMMERS !
2020-06-11 21:10:23
37.49.226.62 attackbots
Jun 11 14:13:56 cp sshd[12091]: Failed password for root from 37.49.226.62 port 34076 ssh2
Jun 11 14:14:41 cp sshd[12402]: Failed password for root from 37.49.226.62 port 38926 ssh2
2020-06-11 20:40:21
197.50.169.15 attackbots
Repeated RDP login failures. Last user: Administrator
2020-06-11 20:43:30
49.249.229.14 attackbotsspam
Jun 11 14:14:33 jane sshd[16847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.229.14 
Jun 11 14:14:34 jane sshd[16847]: Failed password for invalid user wwwadm from 49.249.229.14 port 47456 ssh2
...
2020-06-11 21:00:47
201.67.217.37 attackbots
Repeated RDP login failures. Last user: Administrator
2020-06-11 20:42:54
87.106.79.198 attack
Repeated RDP login failures. Last user: administrator
2020-06-11 20:46:32
189.207.242.100 attackspambots
Repeated RDP login failures. Last user: Server
2020-06-11 20:52:59
222.186.180.147 attack
Hit honeypot r.
2020-06-11 21:10:55
41.203.76.251 attackspam
2020-06-11T12:14:46.331558homeassistant sshd[10300]: Invalid user wwwmirror from 41.203.76.251 port 36410
2020-06-11T12:14:46.342889homeassistant sshd[10300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.203.76.251
...
2020-06-11 20:36:08
190.143.119.228 attackbots
Repeated RDP login failures. Last user: administrator
2020-06-11 20:52:44

Recently Reported IPs

44.98.53.96 173.118.16.182 223.111.150.40 142.250.122.130
67.108.0.101 126.83.197.110 105.72.37.196 8.133.105.37
41.89.180.23 63.46.228.57 204.47.219.52 115.199.62.38
206.194.66.102 116.249.189.143 98.245.142.232 71.66.227.119
55.74.112.249 104.156.49.155 138.5.153.131 72.101.175.161