Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.193.69.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.193.69.142.			IN	A

;; AUTHORITY SECTION:
.			364	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:12:40 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.69.193.116.in-addr.arpa domain name pointer 69142.ninamailservice.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.69.193.116.in-addr.arpa	name = 69142.ninamailservice.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.242.9.169 attackbotsspam
Unauthorized connection attempt from IP address 117.242.9.169 on Port 445(SMB)
2020-09-04 17:34:18
193.95.247.90 attackbots
Invalid user xwj from 193.95.247.90 port 60426
2020-09-04 17:51:28
176.122.156.32 attackspambots
$f2bV_matches
2020-09-04 18:00:18
144.91.78.125 attackbots
Unauthorized connection attempt from IP address 144.91.78.125 on Port 445(SMB)
2020-09-04 17:41:50
114.32.210.222 attackspambots
Attempted connection to port 23.
2020-09-04 17:33:41
191.17.229.232 attackspambots
Attempted connection to port 445.
2020-09-04 17:18:09
93.144.212.99 attack
Invalid user pi from 93.144.212.99 port 39692
2020-09-04 17:50:45
217.64.20.34 attack
vBulletin Remote Code Execution Vulnerability
2020-09-04 17:54:35
188.120.58.57 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-09-04 17:54:56
185.127.24.64 attack
Sep  4 03:50:32 server postfix/smtps/smtpd[26409]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  4 06:16:04 server postfix/smtps/smtpd[4581]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  4 07:47:56 server postfix/smtps/smtpd[11322]: warning: unknown[185.127.24.64]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-04 18:02:50
42.225.147.38 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth): user=root
2020-09-04 17:51:05
189.167.239.191 attackspambots
Honeypot attack, port: 445, PTR: dsl-189-167-239-191-dyn.prod-infinitum.com.mx.
2020-09-04 17:58:45
124.123.177.102 attackbots
Sep  3 18:45:11 mellenthin postfix/smtpd[20438]: NOQUEUE: reject: RCPT from unknown[124.123.177.102]: 554 5.7.1 Service unavailable; Client host [124.123.177.102] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/124.123.177.102; from= to= proto=ESMTP helo=
2020-09-04 17:56:10
14.161.12.119 attackspam
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: Invalid user admin from 14.161.12.119 port 43725
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.12.119
Sep  4 12:15:24 itv-usvr-02 sshd[30676]: Invalid user admin from 14.161.12.119 port 43725
Sep  4 12:15:26 itv-usvr-02 sshd[30676]: Failed password for invalid user admin from 14.161.12.119 port 43725 ssh2
Sep  4 12:19:52 itv-usvr-02 sshd[30860]: Invalid user vinci from 14.161.12.119 port 43991
2020-09-04 18:03:45
103.57.150.168 attackspambots
Attempted connection to port 445.
2020-09-04 17:35:14

Recently Reported IPs

116.127.123.50 116.196.15.179 116.193.69.141 116.193.69.135
116.12.155.107 116.197.133.37 116.202.113.82 116.202.104.81
116.202.109.13 116.20.21.19 116.202.112.139 116.199.170.17
116.202.117.253 116.202.120.148 116.202.128.245 116.202.118.150
116.202.130.199 116.202.127.202 116.202.131.113 116.202.131.194