Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.49.191.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17117
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.49.191.130.			IN	A

;; AUTHORITY SECTION:
.			153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:24:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
130.191.49.116.in-addr.arpa domain name pointer n11649191130.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.191.49.116.in-addr.arpa	name = n11649191130.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.205.1.17 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-01-11 19:48:06
186.150.138.209 attackbots
Jan 11 05:48:13 grey postfix/smtpd\[10764\]: NOQUEUE: reject: RCPT from unknown\[186.150.138.209\]: 554 5.7.1 Service unavailable\; Client host \[186.150.138.209\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[186.150.138.209\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-11 19:41:58
62.234.9.150 attackbotsspam
Jan 11 04:47:53 *** sshd[25623]: Invalid user president from 62.234.9.150
2020-01-11 19:54:51
41.58.159.117 attackbotsspam
failed_logins
2020-01-11 19:33:23
118.70.131.41 attackbots
Unauthorized connection attempt from IP address 118.70.131.41 on Port 445(SMB)
2020-01-11 19:23:35
2.187.91.222 attack
Telnet/23 MH Probe, BF, Hack -
2020-01-11 19:44:36
156.204.151.93 attackspambots
port scan and connect, tcp 23 (telnet)
2020-01-11 19:40:43
201.49.236.219 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-11 19:43:48
182.76.37.222 attack
Unauthorized connection attempt from IP address 182.76.37.222 on Port 445(SMB)
2020-01-11 20:04:56
115.85.46.234 attackspam
Unauthorized connection attempt from IP address 115.85.46.234 on Port 445(SMB)
2020-01-11 19:50:18
47.99.82.90 attack
Jan 11 11:23:52 prox sshd[20211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.99.82.90 
Jan 11 11:23:54 prox sshd[20211]: Failed password for invalid user user from 47.99.82.90 port 37766 ssh2
2020-01-11 19:24:02
223.205.218.241 attack
1578718113 - 01/11/2020 05:48:33 Host: 223.205.218.241/223.205.218.241 Port: 445 TCP Blocked
2020-01-11 19:22:45
123.20.112.28 attackbots
Jan 11 05:48:04 grey postfix/smtpd\[14586\]: NOQUEUE: reject: RCPT from unknown\[123.20.112.28\]: 554 5.7.1 Service unavailable\; Client host \[123.20.112.28\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?123.20.112.28\; from=\ to=\ proto=ESMTP helo=\<\[123.20.112.28\]\>
...
2020-01-11 19:47:03
94.20.21.50 attackspam
Automatic report - XMLRPC Attack
2020-01-11 19:28:14
185.209.0.92 attack
firewall-block, port(s): 26389/tcp
2020-01-11 19:45:54

Recently Reported IPs

116.49.162.196 116.49.192.107 116.49.145.102 116.49.195.230
114.106.172.172 116.49.195.85 116.49.197.163 116.49.193.35
116.49.215.212 116.49.207.125 116.49.242.61 116.49.242.90
116.49.250.170 116.49.238.186 116.49.22.227 116.49.250.245
116.49.26.67 114.106.172.174 116.49.38.205 116.49.55.129