Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dongjak-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.42.169.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.42.169.154.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024111700 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 17 19:12:36 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 154.169.42.116.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.169.42.116.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.173.226 attack
Aug 21 20:46:08 vmd17057 sshd[19817]: Failed password for root from 222.186.173.226 port 21209 ssh2
Aug 21 20:46:11 vmd17057 sshd[19817]: Failed password for root from 222.186.173.226 port 21209 ssh2
...
2020-08-22 02:50:00
103.100.114.154 attackspambots
Fail2Ban Ban Triggered
2020-08-22 02:37:29
5.150.247.132 attackspam
srvr1: (mod_security) mod_security (id:942100) triggered by 5.150.247.132 (SE/-/h-247-132.A328.priv.bahnhof.se): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/21 12:01:42 [error] 482759#0: *840084 [client 5.150.247.132] ModSecurity: Access denied with code 406 (phase 2).  [file "/etc/modsecurity.d/REQUEST-942-APPLICATION-ATTACK-SQLI.conf"] [line "45"] [id "942100"] [rev ""] [msg ""] [redacted] [severity "0"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-sqli"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/152/248/66"] [tag "PCI/6.5.2"] [redacted] [uri "/forum/viewthread.php"] [unique_id "159801130283.685144"] [ref ""], client: 5.150.247.132, [redacted] request: "GET /forum/viewthread.php?thread_id=1122%29+OR+UPDATEXML%285947%2CCONCAT%280x2e%2C0x4d4554334764%2C%28SELECT+%28ELT%282836%3D2836%2C1%29%29%29%2C0x4d4554334764%29%2C5431%29%23+jEfb HTTP/1.1" [redacted]
2020-08-22 03:04:50
116.96.78.24 attack
Unauthorized connection attempt from IP address 116.96.78.24 on Port 445(SMB)
2020-08-22 02:37:13
138.121.170.194 attackbots
Aug 21 20:40:19 pve1 sshd[5594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.170.194 
Aug 21 20:40:20 pve1 sshd[5594]: Failed password for invalid user deploy from 138.121.170.194 port 55378 ssh2
...
2020-08-22 02:43:37
189.7.217.23 attackspambots
Aug 21 21:25:07 gw1 sshd[8394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.217.23
Aug 21 21:25:09 gw1 sshd[8394]: Failed password for invalid user kakuta from 189.7.217.23 port 56018 ssh2
...
2020-08-22 02:57:58
103.226.84.241 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-22 02:51:19
191.33.173.138 attack
Unauthorized connection attempt from IP address 191.33.173.138 on Port 445(SMB)
2020-08-22 02:45:06
193.203.11.186 attack
WordPress XMLRPC scan :: 193.203.11.186 0.088 - [21/Aug/2020:12:02:19  0000] www.[censored_1] "GET /xmlrpc.php?rsd HTTP/1.1" 200 322 "https://www.[censored_1]/" "Mozilla/5.0 (Windows NT 5.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0" "HTTP/1.1"
2020-08-22 02:23:39
83.110.150.23 attack
20/8/21@08:02:05: FAIL: Alarm-Network address from=83.110.150.23
20/8/21@08:02:05: FAIL: Alarm-Network address from=83.110.150.23
...
2020-08-22 02:43:07
51.68.88.26 attack
Aug 21 20:13:28 inter-technics sshd[8099]: Invalid user emily from 51.68.88.26 port 39346
Aug 21 20:13:28 inter-technics sshd[8099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.88.26
Aug 21 20:13:28 inter-technics sshd[8099]: Invalid user emily from 51.68.88.26 port 39346
Aug 21 20:13:31 inter-technics sshd[8099]: Failed password for invalid user emily from 51.68.88.26 port 39346 ssh2
Aug 21 20:14:35 inter-technics sshd[8143]: Invalid user greatwall from 51.68.88.26 port 57106
...
2020-08-22 02:51:58
111.229.176.206 attackspam
$f2bV_matches
2020-08-22 02:31:01
129.144.183.81 attack
Aug 21 18:25:35 * sshd[15276]: Failed password for git from 129.144.183.81 port 24436 ssh2
2020-08-22 02:42:12
5.188.206.194 attackspam
2020-08-21 20:50:45 dovecot_login authenticator failed for \(\[5.188.206.194\]\) \[5.188.206.194\]: 535 Incorrect authentication data \(set_id=ssl@nophost.com\)
2020-08-21 20:50:57 dovecot_login authenticator failed for \(\[5.188.206.194\]\) \[5.188.206.194\]: 535 Incorrect authentication data
2020-08-21 20:51:09 dovecot_login authenticator failed for \(\[5.188.206.194\]\) \[5.188.206.194\]: 535 Incorrect authentication data
2020-08-21 20:51:24 dovecot_login authenticator failed for \(\[5.188.206.194\]\) \[5.188.206.194\]: 535 Incorrect authentication data
2020-08-21 20:51:27 dovecot_login authenticator failed for \(\[5.188.206.194\]\) \[5.188.206.194\]: 535 Incorrect authentication data \(set_id=ssl\)
2020-08-22 03:01:26
61.190.255.186 attack
Attempts against SMTP/SSMTP
2020-08-22 02:25:54

Recently Reported IPs

208.191.119.8 35.223.49.143 158.236.87.204 95.232.113.0
160.158.3.238 210.211.100.34 95.14.47.48 201.98.207.150
200.20.16.210 7.194.156.53 217.154.189.148 241.119.251.54
93.235.70.219 155.32.199.199 202.63.139.25 170.169.62.131
200.28.92.20 224.45.82.39 123.190.203.29 253.44.221.178