Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: Hong Kong Telecommunications (HKT) Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Honeypot attack, port: 5555, PTR: n1164963055.netvigator.com.
2020-02-11 19:56:10
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.49.63.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.49.63.55.			IN	A

;; AUTHORITY SECTION:
.			250	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020600 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:15:52 CST 2020
;; MSG SIZE  rcvd: 116
Host info
55.63.49.116.in-addr.arpa domain name pointer n1164963055.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.63.49.116.in-addr.arpa	name = n1164963055.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.3.4.74 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-06-26 16:10:57
66.240.205.34 attackbots
26.06.2019 05:48:10 Connection to port 53 blocked by firewall
2019-06-26 15:46:07
185.176.27.2 attack
26.06.2019 04:55:08 Connection to port 10000 blocked by firewall
2019-06-26 16:02:48
185.208.208.144 attackspambots
5589/tcp 5555/tcp 6000/tcp...
[2019-04-25/06-26]593pkt,94pt.(tcp)
2019-06-26 15:53:54
81.22.45.251 attack
26.06.2019 07:33:08 Connection to port 5916 blocked by firewall
2019-06-26 15:38:21
176.59.143.78 attackspambots
Unauthorized connection attempt from IP address 176.59.143.78 on Port 445(SMB)
2019-06-26 16:21:11
120.52.152.17 attackbotsspam
[MultiHost/MultiPort scan (9)] tcp/102, tcp/123, tcp/21, tcp/22, tcp/23, tcp/26, tcp/70, tcp/83, tcp/88
[scan/connect: 9 time(s)]
*(RWIN=1024)(06261032)
2019-06-26 16:06:03
182.52.67.37 attack
Honeypot attack, port: 445, PTR: node-d9h.pool-182-52.dynamic.totinternet.net.
2019-06-26 16:19:32
80.82.70.118 attack
[portscan] tcp/110 [POP3]
[portscan] tcp/22 [SSH]
[portscan] tcp/23 [TELNET]
[scan/connect: 3 time(s)]
*(RWIN=1024)(06261032)
2019-06-26 15:41:40
185.176.27.78 attackbots
26.06.2019 04:36:43 Connection to port 7459 blocked by firewall
2019-06-26 15:56:14
185.176.27.34 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-26 16:00:17
134.209.103.14 attack
Jun 26 01:10:49 TORMINT sshd\[31037\]: Invalid user admin from 134.209.103.14
Jun 26 01:10:49 TORMINT sshd\[31037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.103.14
Jun 26 01:10:51 TORMINT sshd\[31037\]: Failed password for invalid user admin from 134.209.103.14 port 53744 ssh2
...
2019-06-26 16:23:59
185.176.27.186 attackspam
Honeypot attack, port: 5555, PTR: PTR record not found
2019-06-26 15:54:42
185.176.27.102 attackspam
Port scan: Attack repeated for 24 hours
2019-06-26 15:55:26
173.203.68.154 attackspambots
SMB Server BruteForce Attack
2019-06-26 16:11:14

Recently Reported IPs

159.203.30.103 69.26.151.234 125.161.128.192 111.223.252.25
202.184.108.4 14.232.208.29 95.165.159.95 185.214.206.255
183.82.8.165 114.239.52.151 1.186.99.79 171.228.177.181
85.209.0.22 222.222.117.67 49.0.113.2 182.233.0.252
2.52.125.99 106.2.3.154 187.134.118.27 136.232.192.250