Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.163.150.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.163.150.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 21:32:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 104.150.163.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 104.150.163.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.129.111 attackspambots
Jul 22 16:17:01 : SSH login attempts with invalid user
2020-07-23 06:33:14
50.70.229.239 attackspambots
Invalid user public from 50.70.229.239 port 58560
2020-07-23 06:26:56
154.68.196.6 attackspam
Port probing on unauthorized port 23
2020-07-23 06:34:10
52.130.85.214 attack
Jul 22 16:00:20 server1 sshd\[16872\]: Invalid user syam from 52.130.85.214
Jul 22 16:00:20 server1 sshd\[16872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.130.85.214 
Jul 22 16:00:23 server1 sshd\[16872\]: Failed password for invalid user syam from 52.130.85.214 port 51880 ssh2
Jul 22 16:05:07 server1 sshd\[18207\]: Invalid user uts from 52.130.85.214
Jul 22 16:05:07 server1 sshd\[18207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.130.85.214 
...
2020-07-23 06:18:44
95.87.25.69 attackspam
Unauthorized connection attempt detected from IP address 95.87.25.69 to port 23
2020-07-23 06:37:09
185.53.88.63 attack
Fail2Ban Ban Triggered
2020-07-23 06:22:03
178.93.29.87 attackbots
Unauthorized connection attempt detected from IP address 178.93.29.87 to port 8080
2020-07-23 06:31:37
193.239.197.205 attackbotsspam
Unauthorized connection attempt detected from IP address 193.239.197.205 to port 23
2020-07-23 06:47:23
170.106.37.222 attack
Unauthorized connection attempt detected from IP address 170.106.37.222 to port 10001
2020-07-23 06:52:21
94.21.158.175 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-23 06:18:11
223.83.138.104 attackbots
Unauthorized connection attempt detected from IP address 223.83.138.104 to port 4284
2020-07-23 06:46:09
171.110.238.114 attack
port scan and connect, tcp 23 (telnet)
2020-07-23 06:51:42
45.83.66.150 attackspambots
Unauthorized connection attempt detected from IP address 45.83.66.150 to port 443
2020-07-23 06:44:11
202.148.25.150 attack
2020-07-22T22:12:45.830924+02:00  sshd[12650]: Failed password for invalid user inferno from 202.148.25.150 port 59006 ssh2
2020-07-23 06:23:06
175.139.1.34 attackspambots
SSH Invalid Login
2020-07-23 06:23:32

Recently Reported IPs

6.144.110.227 57.205.26.17 99.152.91.207 44.32.206.195
96.203.39.174 206.118.56.253 116.238.80.233 30.116.123.101
139.230.202.166 239.173.141.127 226.65.143.189 199.16.136.63
41.220.120.186 136.23.137.133 120.153.119.142 213.101.94.37
160.119.195.73 69.123.84.121 177.217.187.99 64.185.94.215