Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phnom Penh

Region: Phnom Penh

Country: Cambodia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '116.212.130.0 - 116.212.130.255'

% Abuse contact for '116.212.130.0 - 116.212.130.255' is 'abuse@corp.mekongnet.com.kh'

inetnum:        116.212.130.0 - 116.212.130.255
netname:        MEKONGNET-PVN
descr:          MekongNet, Internet Service Provider (ISP), Internet Exchange Provider (IXP) and Internet Data Exchange Center (IDX)
country:        KH
admin-c:        TC1075-AP
tech-c:         TC1075-AP
abuse-c:        AM2376-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-KH-MEKONGNET
mnt-irt:        IRT-MEKONGNET-KH
last-modified:  2022-08-25T06:55:07Z
source:         APNIC

irt:            IRT-MEKONGNET-KH
address:        AnAnA Building,
e-mail:         ty.chan@corp.mekongnet.com.kh
abuse-mailbox:  abuse@corp.mekongnet.com.kh
admin-c:        TC1075-AP
tech-c:         TC1075-AP
auth:           # Filtered
remarks:        ty.chan@corp.mekongnet.com.kh was validated on 2025-08-13
remarks:        abuse@corp.mekongnet.com.kh is invalid
mnt-by:         MAINT-KH-MEKONGNET
last-modified:  2025-09-10T13:06:56Z
source:         APNIC

role:           ABUSE MEKONGNETKH
country:        ZZ
address:        AnAnA Building,
phone:          +000000000
e-mail:         ty.chan@corp.mekongnet.com.kh
admin-c:        TC1075-AP
tech-c:         TC1075-AP
nic-hdl:        AM2376-AP
remarks:        Generated from irt object IRT-MEKONGNET-KH
remarks:        ty.chan@corp.mekongnet.com.kh was validated on 2025-08-13
remarks:        abuse@corp.mekongnet.com.kh is invalid
abuse-mailbox:  abuse@corp.mekongnet.com.kh
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-10T13:08:03Z
source:         APNIC

person:         Ty Chan
address:        #95, Norodom Blvd.
country:        KH
phone:          +85512316858
e-mail:         ty.chan@corp.mekongnet.com.kh
nic-hdl:        TC1075-AP
mnt-by:         MAINT-KH-MEKONGNET
last-modified:  2022-08-25T06:40:07Z
source:         APNIC

% Information related to '116.212.130.0/24AS38235'

route:          116.212.130.0/24
descr:          MekongNet-NET, This is non-portable space.
origin:         AS38235
country:        KH
remarks:        This is MekongNet IP Address Ranges
notify:         sarith@corp.mekongnet.com.kh
mnt-lower:      MAINT-KH-MEKONGNET
mnt-routes:     MAINT-KH-MEKONGNET
mnt-by:         MAINT-KH-MEKONGNET
last-modified:  2016-12-01T07:33:31Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.212.130.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.212.130.221.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 13 15:19:25 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 221.130.212.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.130.212.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.202.65 attack
Mar 26 07:30:13 srv206 sshd[8938]: Invalid user bcampion from 49.235.202.65
Mar 26 07:30:13 srv206 sshd[8938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.202.65
Mar 26 07:30:13 srv206 sshd[8938]: Invalid user bcampion from 49.235.202.65
Mar 26 07:30:15 srv206 sshd[8938]: Failed password for invalid user bcampion from 49.235.202.65 port 37670 ssh2
...
2020-03-26 19:17:31
51.38.186.47 attackspambots
2020-03-26T09:00:41.432060shield sshd\[8416\]: Invalid user gb from 51.38.186.47 port 53780
2020-03-26T09:00:41.441425shield sshd\[8416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.ip-51-38-186.eu
2020-03-26T09:00:43.296550shield sshd\[8416\]: Failed password for invalid user gb from 51.38.186.47 port 53780 ssh2
2020-03-26T09:04:04.151197shield sshd\[9237\]: Invalid user st from 51.38.186.47 port 39664
2020-03-26T09:04:04.154875shield sshd\[9237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.ip-51-38-186.eu
2020-03-26 19:16:30
167.114.4.204 attackspam
(sshd) Failed SSH login from 167.114.4.204 (PL/Poland/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 26 10:50:42 ubnt-55d23 sshd[13872]: Invalid user test from 167.114.4.204 port 45726
Mar 26 10:50:44 ubnt-55d23 sshd[13872]: Failed password for invalid user test from 167.114.4.204 port 45726 ssh2
2020-03-26 18:50:10
50.53.179.3 attackspambots
Invalid user administrator from 50.53.179.3 port 33010
2020-03-26 19:06:10
162.243.132.30 attackspambots
Unauthorized connection attempt detected from IP address 162.243.132.30 to port 435
2020-03-26 18:52:50
93.170.36.2 attack
Invalid user oraprod from 93.170.36.2 port 56139
2020-03-26 18:56:16
209.141.41.96 attackbots
Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942
Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 
Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942
Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 
Mar 26 11:54:45 tuxlinux sshd[49293]: Invalid user tty from 209.141.41.96 port 42942
Mar 26 11:54:45 tuxlinux sshd[49293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96 
Mar 26 11:54:48 tuxlinux sshd[49293]: Failed password for invalid user tty from 209.141.41.96 port 42942 ssh2
...
2020-03-26 19:03:30
140.207.81.233 attack
DATE:2020-03-26 09:43:25, IP:140.207.81.233, PORT:ssh SSH brute force auth (docker-dc)
2020-03-26 19:01:17
167.86.103.125 attack
2020-03-26T01:39:28.604586xentho-1 sshd[84350]: Invalid user usuario from 167.86.103.125 port 45494
2020-03-26T01:39:30.716878xentho-1 sshd[84350]: Failed password for invalid user usuario from 167.86.103.125 port 45494 ssh2
2020-03-26T01:41:26.317688xentho-1 sshd[84382]: Invalid user vagrant from 167.86.103.125 port 45728
2020-03-26T01:41:26.324782xentho-1 sshd[84382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.125
2020-03-26T01:41:26.317688xentho-1 sshd[84382]: Invalid user vagrant from 167.86.103.125 port 45728
2020-03-26T01:41:28.631766xentho-1 sshd[84382]: Failed password for invalid user vagrant from 167.86.103.125 port 45728 ssh2
2020-03-26T01:43:32.160286xentho-1 sshd[84404]: Invalid user vcr from 167.86.103.125 port 45964
2020-03-26T01:43:32.168015xentho-1 sshd[84404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.103.125
2020-03-26T01:43:32.160286xentho-1 sshd[84404]: Inva
...
2020-03-26 19:05:25
41.214.152.106 attackspam
Unauthorized connection attempt detected from IP address 41.214.152.106 to port 445
2020-03-26 19:07:00
116.206.28.7 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 26-03-2020 03:50:14.
2020-03-26 18:45:03
116.171.245.47 attackspambots
firewall-block, port(s): 1433/tcp
2020-03-26 18:50:57
140.143.183.71 attackspambots
Mar 26 11:15:44 serwer sshd\[30392\]: Invalid user ad from 140.143.183.71 port 35430
Mar 26 11:15:44 serwer sshd\[30392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.183.71
Mar 26 11:15:46 serwer sshd\[30392\]: Failed password for invalid user ad from 140.143.183.71 port 35430 ssh2
...
2020-03-26 19:24:39
46.219.3.139 attackspambots
k+ssh-bruteforce
2020-03-26 19:09:28
78.26.80.32 attack
firewall-block, port(s): 80/tcp
2020-03-26 19:00:35

Recently Reported IPs

192.168.10.152 172.190.142.176 47.96.247.217 202.108.57.65
106.224.11.238 116.228.148.21 38.87.67.62 13.219.197.89
210.218.107.35 20.65.136.30 34.40.79.223 17.246.23.69
181.215.204.32 210.30.203.54 27.254.83.122 36.99.137.94
116.62.133.247 104.196.203.207 10.16.95.125 10.16.95.130