Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.107.107.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40421
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.107.107.242.		IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:46:43 CST 2022
;; MSG SIZE  rcvd: 108
Host info
242.107.107.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.107.107.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.255.132.213 attack
Feb 25 17:35:41  sshd\[16357\]: Invalid user csgoserver from 51.255.132.213Feb 25 17:35:43  sshd\[16357\]: Failed password for invalid user csgoserver from 51.255.132.213 port 40912 ssh2
...
2020-02-26 04:53:51
90.190.204.254 attackspam
55805/udp
[2020-02-25]1pkt
2020-02-26 05:01:02
192.241.212.150 attackbots
scan r
2020-02-26 05:18:23
116.101.248.49 attackbots
445/tcp
[2020-02-25]1pkt
2020-02-26 05:24:36
94.183.195.19 attackspambots
8080/tcp
[2020-02-25]1pkt
2020-02-26 05:31:29
116.49.142.48 attackbotsspam
5555/tcp
[2020-02-25]1pkt
2020-02-26 05:22:22
167.99.183.191 attackbots
SSH auth scanning - multiple failed logins
2020-02-26 05:06:19
212.115.233.235 attack
445/tcp
[2020-02-25]1pkt
2020-02-26 05:29:55
68.191.219.254 attack
Honeypot attack, port: 81, PTR: 68-191-219-254.static.dntn.tx.charter.com.
2020-02-26 04:53:30
201.248.194.104 attackspam
Brute forcing RDP port 3389
2020-02-26 05:03:51
88.135.49.14 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-26 05:08:02
193.169.132.216 attackspam
445/tcp
[2020-02-25]1pkt
2020-02-26 04:57:47
111.2.195.31 attackspambots
CN_APNIC-HM_<177>1582661291 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2] {TCP} 111.2.195.31:23457
2020-02-26 04:57:14
222.179.234.74 attack
404 NOT FOUND
2020-02-26 05:27:43
190.216.251.5 attackbotsspam
Honeypot attack, port: 445, PTR: 251.216.190.in-addr.arpa.
2020-02-26 05:12:15

Recently Reported IPs

116.106.6.240 116.106.15.25 116.107.101.232 116.106.183.28
116.107.203.175 116.107.239.175 116.107.112.12 116.107.51.86
116.107.82.31 116.108.5.239 116.108.24.164 116.109.214.104
116.110.123.243 116.108.242.183 116.110.40.118 116.110.42.47
116.110.46.247 116.110.81.50 116.110.76.191 116.11.99.81