Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Bangladesh

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
116.212.109.195 attackspambots
Aug 26 04:40:20 shivevps sshd[23997]: Bad protocol version identification '\024' from 116.212.109.195 port 46295
Aug 26 04:40:41 shivevps sshd[24454]: Bad protocol version identification '\024' from 116.212.109.195 port 47267
Aug 26 04:43:03 shivevps sshd[28644]: Bad protocol version identification '\024' from 116.212.109.195 port 52459
Aug 26 04:44:38 shivevps sshd[31664]: Bad protocol version identification '\024' from 116.212.109.195 port 55303
...
2020-08-26 15:32:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.212.109.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.212.109.132.		IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 16:57:27 CST 2022
;; MSG SIZE  rcvd: 108
Host info
132.109.212.116.in-addr.arpa domain name pointer n2sys-gs-ac1-p7.telnet.com.bd.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.109.212.116.in-addr.arpa	name = n2sys-gs-ac1-p7.telnet.com.bd.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.33.24 attack
Unauthorized connection attempt detected from IP address 159.203.33.24 to port 2004
2019-12-29 16:35:57
138.204.112.132 attackspam
Unauthorized connection attempt detected from IP address 138.204.112.132 to port 23
2019-12-29 16:37:56
196.221.124.183 attackbots
Unauthorized connection attempt detected from IP address 196.221.124.183 to port 445
2019-12-29 16:29:18
46.201.13.11 attackspambots
Unauthorized connection attempt detected from IP address 46.201.13.11 to port 2323
2019-12-29 16:52:07
149.12.217.240 attack
Unauthorized connection attempt detected from IP address 149.12.217.240 to port 23
2019-12-29 16:36:59
189.240.224.250 attack
Honeypot attack, port: 445, PTR: customer-189-240-224-250.uninet-ide.com.mx.
2019-12-29 16:30:12
202.29.33.74 attack
Repeated brute force against a port
2019-12-29 16:13:36
89.239.32.17 attackbots
Unauthorized connection attempt detected from IP address 89.239.32.17 to port 22
2019-12-29 16:46:11
95.48.54.106 attack
$f2bV_matches
2019-12-29 16:14:55
24.72.80.84 attack
Unauthorized connection attempt detected from IP address 24.72.80.84 to port 81
2019-12-29 16:54:52
39.117.139.244 attackbots
Automatic report - SSH Brute-Force Attack
2019-12-29 16:18:29
217.174.254.186 attackspam
Unauthorized connection attempt detected from IP address 217.174.254.186 to port 445
2019-12-29 16:26:22
109.125.166.207 attack
Unauthorized connection attempt detected from IP address 109.125.166.207 to port 8080
2019-12-29 16:42:01
59.9.198.185 attack
Unauthorized connection attempt detected from IP address 59.9.198.185 to port 5555
2019-12-29 16:50:50
130.61.201.48 attackspambots
Unauthorized connection attempt detected from IP address 130.61.201.48 to port 23
2019-12-29 16:38:56

Recently Reported IPs

116.209.57.183 116.212.109.45 116.212.124.140 116.212.109.42
116.212.122.226 116.212.109.136 116.212.109.9 116.212.112.89
116.212.142.194 116.212.142.218 117.43.50.244 116.212.142.78
116.212.111.29 116.212.143.154 116.212.142.202 116.212.142.51
116.212.152.254 116.212.143.182 116.212.143.18 116.212.143.178