Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.48.54.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28270
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.48.54.169.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:43:39 CST 2025
;; MSG SIZE  rcvd: 106
Host info
169.54.48.116.in-addr.arpa domain name pointer n1164854169.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.54.48.116.in-addr.arpa	name = n1164854169.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.27.185.8 attackbotsspam
ThinkPHP RCE Exploitation Attempt
2020-05-19 23:45:29
80.82.78.104 attackbots
port scan and connect, tcp 80 (http)
2020-05-19 23:47:15
2001:41d0:401:3100::4e8f attackbots
xmlrpc attack
2020-05-19 23:56:08
51.75.255.41 attackspam
2020-05-19T11:52:30.919303scmdmz1 sshd[19521]: Invalid user qyc from 51.75.255.41 port 58448
2020-05-19T11:52:32.900427scmdmz1 sshd[19521]: Failed password for invalid user qyc from 51.75.255.41 port 58448 ssh2
2020-05-19T11:56:21.359132scmdmz1 sshd[20018]: Invalid user jinjiayu from 51.75.255.41 port 38476
...
2020-05-19 23:43:41
103.66.48.38 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 99 - port: 23 proto: TCP cat: Misc Attack
2020-05-17 08:42:38
84.78.131.11 attackspambots
1589882158 - 05/19/2020 11:55:58 Host: 84.78.131.11/84.78.131.11 Port: 445 TCP Blocked
2020-05-19 23:54:00
182.75.248.254 attack
2020-05-19T11:51:23.834241scmdmz1 sshd[19354]: Invalid user ajr from 182.75.248.254 port 54438
2020-05-19T11:51:25.924703scmdmz1 sshd[19354]: Failed password for invalid user ajr from 182.75.248.254 port 54438 ssh2
2020-05-19T11:55:39.442142scmdmz1 sshd[19941]: Invalid user tvl from 182.75.248.254 port 48594
...
2020-05-19 23:57:46
113.31.109.240 attack
May 19 11:51:47 OPSO sshd\[26116\]: Invalid user pmc from 113.31.109.240 port 55576
May 19 11:51:47 OPSO sshd\[26116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.109.240
May 19 11:51:49 OPSO sshd\[26116\]: Failed password for invalid user pmc from 113.31.109.240 port 55576 ssh2
May 19 11:55:43 OPSO sshd\[26594\]: Invalid user vav from 113.31.109.240 port 39224
May 19 11:55:43 OPSO sshd\[26594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.109.240
2020-05-19 23:57:04
118.71.237.234 attack
Brute force
2020-05-19 12:16:44
51.75.28.134 attackbotsspam
May 19 11:55:46 pornomens sshd\[4859\]: Invalid user pyp from 51.75.28.134 port 43724
May 19 11:55:46 pornomens sshd\[4859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.28.134
May 19 11:55:47 pornomens sshd\[4859\]: Failed password for invalid user pyp from 51.75.28.134 port 43724 ssh2
...
2020-05-19 23:55:41
127.0.0.1 attackbotsspam
This is a Test for the status Page
2020-05-19 23:49:37
122.51.210.116 attack
$f2bV_matches
2020-05-19 23:47:56
45.172.172.1 attack
Brute-force attempt banned
2020-05-18 22:45:41
158.101.16.97 attack
Oracle Cloud. 
phpmyadmin/script/setup.php
/login?from=0.000000
2020-05-17 18:01:13
65.122.183.157 attack
[19/May/2020:10:09:34 +0200] masscan/1.0
2020-05-19 23:51:46

Recently Reported IPs

48.188.180.71 53.151.9.73 62.208.250.104 233.41.174.65
75.79.160.1 236.76.245.166 139.36.209.82 48.193.245.198
230.19.134.128 23.36.61.204 147.158.99.193 146.234.151.117
220.222.162.85 175.49.218.124 147.178.97.168 165.144.78.131
213.77.16.106 137.244.63.240 197.151.253.132 252.126.22.188