Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.242.98.161
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.242.98.161.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 09:11:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 161.98.242.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 161.98.242.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.63.30 attackspambots
Automatic report - Banned IP Access
2020-10-12 03:19:54
66.150.214.8 attackbots
Unauthorised access (Oct 10) SRC=66.150.214.8 LEN=40 TTL=245 ID=58859 TCP DPT=8080 WINDOW=5840 
Unauthorised access (Oct  6) SRC=66.150.214.8 LEN=40 TTL=245 ID=872 TCP DPT=8080 WINDOW=5840
2020-10-12 03:28:20
221.149.93.203 attackspam
Port Scan: TCP/443
2020-10-12 03:06:52
66.206.0.172 attack
[portscan] Port scan
2020-10-12 03:27:14
188.255.131.67 attack
Port Scan: TCP/443
2020-10-12 03:34:35
120.31.71.238 attackbotsspam
Oct 11 16:31:50 rancher-0 sshd[600480]: Invalid user gary from 120.31.71.238 port 40780
...
2020-10-12 03:25:36
139.59.93.93 attack
2020-10-11T20:47:04.793419vps773228.ovh.net sshd[4085]: Invalid user chris from 139.59.93.93 port 58602
2020-10-11T20:47:04.806572vps773228.ovh.net sshd[4085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.93.93
2020-10-11T20:47:04.793419vps773228.ovh.net sshd[4085]: Invalid user chris from 139.59.93.93 port 58602
2020-10-11T20:47:06.828594vps773228.ovh.net sshd[4085]: Failed password for invalid user chris from 139.59.93.93 port 58602 ssh2
2020-10-11T20:51:11.784374vps773228.ovh.net sshd[4203]: Invalid user surendra from 139.59.93.93 port 35976
...
2020-10-12 03:07:15
82.164.156.84 attackbots
2020-10-11T19:11:38.404500mail.broermann.family sshd[14828]: Invalid user gast from 82.164.156.84 port 39044
2020-10-11T19:11:40.020573mail.broermann.family sshd[14828]: Failed password for invalid user gast from 82.164.156.84 port 39044 ssh2
2020-10-11T19:16:38.816529mail.broermann.family sshd[15237]: Failed password for root from 82.164.156.84 port 41366 ssh2
2020-10-11T19:21:25.122942mail.broermann.family sshd[15704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ti0004q162-2107.bb.online.no  user=root
2020-10-11T19:21:26.651112mail.broermann.family sshd[15704]: Failed password for root from 82.164.156.84 port 43674 ssh2
...
2020-10-12 03:23:27
222.96.85.12 attackbots
Port Scan: TCP/443
2020-10-12 03:09:49
218.4.159.170 attackbotsspam
IP 218.4.159.170 attacked honeypot on port: 139 at 10/10/2020 1:42:13 PM
2020-10-12 03:05:31
192.35.168.110 attack
 TCP (SYN) 192.35.168.110:58868 -> port 443, len 44
2020-10-12 03:38:01
91.122.194.246 attack
Port Scan: TCP/443
2020-10-12 03:19:42
170.239.128.7 attackbotsspam
Unauthorized connection attempt from IP address 170.239.128.7 on Port 445(SMB)
2020-10-12 03:24:16
122.51.89.18 attack
Oct 11 16:45:00 ns3033917 sshd[9924]: Invalid user anfernee from 122.51.89.18 port 42244
Oct 11 16:45:02 ns3033917 sshd[9924]: Failed password for invalid user anfernee from 122.51.89.18 port 42244 ssh2
Oct 11 16:49:57 ns3033917 sshd[9991]: Invalid user oracle from 122.51.89.18 port 36130
...
2020-10-12 03:17:25
157.230.93.183 attackspam
2020-10-11T13:03:59.854062linuxbox-skyline sshd[32469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.93.183  user=root
2020-10-11T13:04:01.551765linuxbox-skyline sshd[32469]: Failed password for root from 157.230.93.183 port 59756 ssh2
...
2020-10-12 03:24:59

Recently Reported IPs

38.44.60.18 180.15.34.242 161.229.58.182 167.204.22.175
175.201.251.50 199.22.32.105 209.253.65.169 16.71.180.19
240.3.76.41 136.140.19.162 70.238.149.253 57.94.169.185
253.188.83.124 95.231.8.9 133.158.205.21 141.133.210.33
239.200.216.143 228.237.197.168 9.86.245.206 138.150.167.239