Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.231.242.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55877
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.231.242.138.		IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:15:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 138.242.231.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.242.231.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.83.10.174 attackspam
Unauthorized connection attempt from IP address 183.83.10.174 on Port 445(SMB)
2019-08-17 07:50:32
123.30.7.177 attackspambots
Invalid user nginx from 123.30.7.177 port 45646
2019-08-17 08:03:29
14.152.49.80 attack
Unauthorized connection attempt from IP address 14.152.49.80 on Port 445(SMB)
2019-08-17 07:52:13
104.194.69.10 attack
Aug 16 19:47:32 plusreed sshd[31639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.69.10  user=www-data
Aug 16 19:47:34 plusreed sshd[31639]: Failed password for www-data from 104.194.69.10 port 37274 ssh2
...
2019-08-17 08:28:37
106.12.193.39 attack
Aug 16 22:58:22 server sshd\[10284\]: Invalid user monitoring from 106.12.193.39 port 57354
Aug 16 22:58:22 server sshd\[10284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.39
Aug 16 22:58:23 server sshd\[10284\]: Failed password for invalid user monitoring from 106.12.193.39 port 57354 ssh2
Aug 16 23:02:45 server sshd\[14828\]: Invalid user admin from 106.12.193.39 port 42986
Aug 16 23:02:45 server sshd\[14828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.193.39
2019-08-17 08:07:49
103.76.252.6 attackbots
Aug 17 00:53:26 debian sshd\[699\]: Invalid user oracle from 103.76.252.6 port 34209
Aug 17 00:53:26 debian sshd\[699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6
...
2019-08-17 08:10:15
51.91.251.20 attackspam
Reported by AbuseIPDB proxy server.
2019-08-17 08:25:46
106.12.7.173 attack
frenzy
2019-08-17 07:48:57
188.187.54.217 attack
[portscan] Port scan
2019-08-17 08:26:44
80.82.64.98 attack
Aug 16 20:50:30 zeus dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.98, lip=51.75.195.184, session=\
Aug 16 23:04:11 zeus dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.98, lip=51.75.195.184, session=\
Aug 17 01:18:01 zeus dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=80.82.64.98, lip=51.75.195.184, session=\<4Ed5M0SQxEZQUkBi\>
...
2019-08-17 07:54:21
23.129.64.188 attackbotsspam
2019-08-17T00:03:30.631775abusebot-4.cloudsearch.cf sshd\[6940\]: Invalid user admin from 23.129.64.188 port 54299
2019-08-17 08:28:02
192.241.249.53 attackbots
Aug 16 23:10:23 MK-Soft-VM3 sshd\[18030\]: Invalid user anonymous from 192.241.249.53 port 39037
Aug 16 23:10:23 MK-Soft-VM3 sshd\[18030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.249.53
Aug 16 23:10:25 MK-Soft-VM3 sshd\[18030\]: Failed password for invalid user anonymous from 192.241.249.53 port 39037 ssh2
...
2019-08-17 07:59:58
92.53.65.184 attack
firewall-block, port(s): 6000/tcp
2019-08-17 08:08:17
101.53.137.178 attackspambots
Aug 17 03:02:56 webhost01 sshd[3356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.53.137.178
Aug 17 03:02:58 webhost01 sshd[3356]: Failed password for invalid user ansibleuser from 101.53.137.178 port 52192 ssh2
...
2019-08-17 08:25:14
45.71.230.10 attackspambots
Dormant IP part of DDos
2019-08-17 08:02:37

Recently Reported IPs

116.231.241.57 116.231.242.148 116.231.242.152 116.231.242.160
116.231.242.196 116.231.242.133 114.106.137.86 116.231.242.142
116.231.242.198 116.231.242.81 116.231.243.149 116.231.243.167
116.231.243.189 116.231.243.218 116.231.243.197 116.231.243.112
116.231.242.205 116.231.242.42 197.141.22.40 116.231.243.231