Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.16.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.16.149.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:12:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.16.202.116.in-addr.arpa domain name pointer static.149.16.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.16.202.116.in-addr.arpa	name = static.149.16.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.19.31.27 attackbots
Feb 12 23:47:51 silence02 sshd[19259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.31.27
Feb 12 23:47:54 silence02 sshd[19259]: Failed password for invalid user pul from 195.19.31.27 port 37024 ssh2
Feb 12 23:50:57 silence02 sshd[19538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.31.27
2020-02-13 06:54:05
120.133.236.138 attackspam
Invalid user ykn from 120.133.236.138 port 57066
2020-02-13 07:14:25
169.197.108.42 attackbotsspam
404 NOT FOUND
2020-02-13 06:56:57
49.81.224.149 attackbots
Email rejected due to spam filtering
2020-02-13 06:47:27
37.139.1.197 attackbots
Invalid user ceq from 37.139.1.197 port 53116
2020-02-13 06:59:56
41.215.10.6 attackspam
Brute force attempt
2020-02-13 06:51:43
62.107.116.83 attack
firewall-block, port(s): 49189/udp
2020-02-13 06:59:37
178.27.195.1 attackspam
Feb 12 23:20:27 debian-2gb-nbg1-2 kernel: \[3805256.806451\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.27.195.1 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=57852 DF PROTO=TCP SPT=38961 DPT=60 WINDOW=64240 RES=0x00 CWR ECE SYN URGP=0
2020-02-13 06:51:06
37.152.177.160 attackbots
Feb 12 23:20:37 MK-Soft-VM3 sshd[9954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.177.160 
Feb 12 23:20:39 MK-Soft-VM3 sshd[9954]: Failed password for invalid user jenny1 from 37.152.177.160 port 50562 ssh2
...
2020-02-13 06:43:20
222.186.15.91 attackbotsspam
$f2bV_matches
2020-02-13 06:42:28
84.15.212.100 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-02-13 06:54:22
196.52.43.106 attackbotsspam
Honeypot hit.
2020-02-13 06:41:21
93.115.126.45 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-13 06:42:58
51.75.160.215 attackbots
Feb 12 18:10:43 plusreed sshd[10149]: Invalid user saumitra from 51.75.160.215
...
2020-02-13 07:13:31
110.78.23.133 attack
Invalid user rogalka from 110.78.23.133 port 1062
2020-02-13 06:37:08

Recently Reported IPs

116.202.157.61 116.202.16.153 116.202.17.245 116.202.180.41
116.202.165.197 116.202.185.55 116.202.192.241 116.202.195.246
116.202.188.80 116.202.165.222 252.178.7.61 116.202.195.240
116.202.197.50 116.202.201.242 116.202.20.132 116.202.21.156
116.202.200.236 116.202.209.61 116.202.210.162 116.202.217.204