Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.49.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.49.42.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030701 1800 900 604800 86400

;; Query time: 133 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 02:16:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.49.202.116.in-addr.arpa domain name pointer mail.noteboox.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.49.202.116.in-addr.arpa	name = mail.noteboox.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.2.149.76 attackspam
fell into ViewStateTrap:paris
2020-04-18 19:04:29
80.82.78.211 attack
firewall-block, port(s): 9932/tcp, 9956/tcp, 59932/tcp
2020-04-18 19:07:44
106.13.102.141 attack
2020-04-17 UTC: (20x) - Ubuntu,admin(3x),admin1,bm,hh,ht,mq,oracle,root(4x),test(2x),test1,teste,we,wz
2020-04-18 18:50:32
78.30.36.76 attack
Unauthorized connection attempt detected from IP address 78.30.36.76 to port 81
2020-04-18 18:59:29
185.202.2.210 attackbotsspam
Brute forcing RDP port 3389
2020-04-18 18:58:30
62.234.62.206 attack
IP blocked
2020-04-18 19:08:58
68.183.95.11 attack
Apr 18 10:37:47 XXXXXX sshd[44012]: Invalid user postgres from 68.183.95.11 port 32832
2020-04-18 19:03:53
198.108.67.50 attack
firewall-block, port(s): 9023/tcp
2020-04-18 18:53:06
138.197.151.129 attackbots
web-1 [ssh] SSH Attack
2020-04-18 18:44:46
31.185.104.21 attack
CMS (WordPress or Joomla) login attempt.
2020-04-18 18:30:03
117.33.158.93 attackspambots
Invalid user jh from 117.33.158.93 port 54208
2020-04-18 19:11:06
106.75.157.90 attack
SSH/22 MH Probe, BF, Hack -
2020-04-18 18:49:21
128.199.225.104 attackspam
Apr 18 12:00:34 pkdns2 sshd\[30822\]: Invalid user ubuntu from 128.199.225.104Apr 18 12:00:36 pkdns2 sshd\[30822\]: Failed password for invalid user ubuntu from 128.199.225.104 port 53370 ssh2Apr 18 12:04:31 pkdns2 sshd\[30932\]: Invalid user admin from 128.199.225.104Apr 18 12:04:32 pkdns2 sshd\[30932\]: Failed password for invalid user admin from 128.199.225.104 port 59460 ssh2Apr 18 12:08:17 pkdns2 sshd\[31102\]: Invalid user py from 128.199.225.104Apr 18 12:08:19 pkdns2 sshd\[31102\]: Failed password for invalid user py from 128.199.225.104 port 37320 ssh2
...
2020-04-18 19:07:00
172.245.183.16 attack
firewall-block, port(s): 8088/tcp
2020-04-18 18:55:44
80.127.116.96 attack
firewall-block, port(s): 8080/tcp
2020-04-18 19:05:30

Recently Reported IPs

116.202.47.46 116.202.55.216 116.202.6.191 116.202.6.197
116.202.77.17 116.202.77.6 140.106.88.195 116.202.86.166
116.202.87.17 116.202.94.15 116.203.0.146 116.203.0.185
116.203.1.173 175.10.91.249 116.203.101.0 116.203.103.134
116.203.103.216 116.203.104.105 116.203.107.185 116.203.110.130