Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Mobile

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.213.228.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.213.228.142.		IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102901 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 30 09:19:57 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.228.213.116.in-addr.arpa domain name pointer 116.213.228.142.static.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.228.213.116.in-addr.arpa	name = 116.213.228.142.static.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.211.82.237 attack
Invalid user ma from 129.211.82.237 port 45614
2020-01-20 15:31:54
80.66.81.86 attack
Jan 20 07:35:31 relay postfix/smtpd\[28864\]: warning: unknown\[80.66.81.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 07:46:41 relay postfix/smtpd\[9964\]: warning: unknown\[80.66.81.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 07:47:02 relay postfix/smtpd\[9964\]: warning: unknown\[80.66.81.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 07:47:41 relay postfix/smtpd\[11023\]: warning: unknown\[80.66.81.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan 20 07:48:01 relay postfix/smtpd\[11030\]: warning: unknown\[80.66.81.86\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-20 15:33:09
222.186.180.17 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Failed password for root from 222.186.180.17 port 29162 ssh2
Failed password for root from 222.186.180.17 port 29162 ssh2
Failed password for root from 222.186.180.17 port 29162 ssh2
Failed password for root from 222.186.180.17 port 29162 ssh2
2020-01-20 15:43:18
43.245.222.176 attackspambots
Unauthorized connection attempt detected from IP address 43.245.222.176 to port 8889 [J]
2020-01-20 15:40:17
138.246.253.21 attack
Port scan on 1 port(s): 53
2020-01-20 15:52:05
91.185.193.101 attackbotsspam
Jan 19 22:06:58 hanapaa sshd\[10113\]: Invalid user postgres from 91.185.193.101
Jan 19 22:06:58 hanapaa sshd\[10113\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.185.193.101
Jan 19 22:07:01 hanapaa sshd\[10113\]: Failed password for invalid user postgres from 91.185.193.101 port 41101 ssh2
Jan 19 22:07:49 hanapaa sshd\[10185\]: Invalid user nagios from 91.185.193.101
Jan 19 22:07:49 hanapaa sshd\[10185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.185.193.101
2020-01-20 16:10:50
117.215.72.118 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-01-2020 04:55:09.
2020-01-20 15:53:12
159.203.197.148 attack
Web application attack detected by fail2ban
2020-01-20 15:57:37
202.111.10.73 attackspam
unauthorized connection attempt
2020-01-20 15:40:32
92.118.37.70 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 3389 proto: TCP cat: Misc Attack
2020-01-20 16:01:44
82.252.141.43 attackbotsspam
Unauthorized connection attempt detected from IP address 82.252.141.43 to port 5555 [J]
2020-01-20 15:59:47
42.62.2.130 attack
Unauthorized connection attempt detected from IP address 42.62.2.130 to port 1433 [J]
2020-01-20 15:34:18
65.74.177.90 attackbots
65.74.177.90 - - \[20/Jan/2020:05:55:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.74.177.90 - - \[20/Jan/2020:05:55:27 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.74.177.90 - - \[20/Jan/2020:05:55:30 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-20 15:39:36
221.165.151.244 attackspambots
2020-01-20T06:02:22.527061shield sshd\[15210\]: Invalid user vilma from 221.165.151.244 port 44332
2020-01-20T06:02:22.530583shield sshd\[15210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.151.244
2020-01-20T06:02:24.394605shield sshd\[15210\]: Failed password for invalid user vilma from 221.165.151.244 port 44332 ssh2
2020-01-20T06:10:52.783213shield sshd\[17781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.151.244  user=root
2020-01-20T06:10:54.326355shield sshd\[17781\]: Failed password for root from 221.165.151.244 port 32800 ssh2
2020-01-20 15:37:11
182.61.176.53 attackbots
Invalid user lea from 182.61.176.53 port 43556
2020-01-20 15:57:16

Recently Reported IPs

61.218.253.196 232.70.183.197 66.228.38.240 206.215.36.248
232.126.80.131 52.78.202.221 56.240.231.104 46.72.153.209
80.187.236.156 76.170.122.224 201.213.225.158 197.40.184.145
59.223.35.36 31.73.119.230 226.224.184.109 106.86.170.19
120.107.97.143 25.198.203.240 211.22.202.12 63.60.166.47