Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Pakistan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.206.164.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14634
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.206.164.142.		IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101002 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 11 11:29:29 CST 2020
;; MSG SIZE  rcvd: 119
Host info
142.164.206.116.in-addr.arpa domain name pointer cns142.cactuspk.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.164.206.116.in-addr.arpa	name = cns142.cactuspk.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.216.115.38 attack
Brute%20Force%20SSH
2020-10-07 02:39:04
85.235.53.153 attackbots
Found on Block BinaryDefense  / proto=6  .  srcport=56105  .  dstport=445 SMB  .     (1824)
2020-10-07 02:36:23
122.51.192.105 attack
(sshd) Failed SSH login from 122.51.192.105 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  6 12:09:42 optimus sshd[3889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 12:09:43 optimus sshd[3889]: Failed password for root from 122.51.192.105 port 51932 ssh2
Oct  6 12:19:30 optimus sshd[7367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
Oct  6 12:19:31 optimus sshd[7367]: Failed password for root from 122.51.192.105 port 47474 ssh2
Oct  6 12:20:57 optimus sshd[7831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.192.105  user=root
2020-10-07 02:47:28
198.251.55.159 attackbotsspam
Port Scan: TCP/443
2020-10-07 03:02:23
222.95.180.220 attackbots
23/tcp
[2020-10-05]1pkt
2020-10-07 02:48:14
45.112.69.185 attackbotsspam
22/tcp 8291/tcp...
[2020-10-05]5pkt,2pt.(tcp)
2020-10-07 03:00:28
184.154.139.21 attackspam
(From 1) 1
2020-10-07 02:48:42
198.199.89.152 attack
Oct  6 19:26:22 ns3164893 sshd[22965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.89.152  user=root
Oct  6 19:26:24 ns3164893 sshd[22965]: Failed password for root from 198.199.89.152 port 55384 ssh2
...
2020-10-07 02:51:06
192.3.182.226 attack
Unauthorized connection attempt from IP address 192.3.182.226 on Port 445(SMB)
2020-10-07 02:29:09
198.45.212.244 attack
ssh 22
2020-10-07 02:51:21
23.94.204.232 attackbotsspam
Oct  6 16:13:48 prox sshd[9731]: Failed password for root from 23.94.204.232 port 39010 ssh2
2020-10-07 02:50:40
187.214.94.97 attackbotsspam
23/tcp
[2020-10-05]1pkt
2020-10-07 02:40:00
150.116.220.251 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-07 02:46:50
103.219.112.88 attack
SSH bruteforce
2020-10-07 02:54:35
189.153.154.6 attack
23/tcp
[2020-10-05]1pkt
2020-10-07 02:54:03

Recently Reported IPs

109.73.3.76 109.73.3.133 109.73.3.170 109.73.3.226
109.73.3.143 109.73.3.18 109.73.3.235 109.73.3.184
109.73.3.12 192.37.178.66 174.250.64.30 152.231.188.202
111.254.65.183 92.108.240.131 70.73.22.154 115.72.77.111
45.32.121.134 49.197.60.8 106.193.112.12 77.54.7.18