Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.242.116.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.242.116.164.		IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:22:07 CST 2022
;; MSG SIZE  rcvd: 108
Host info
164.116.242.117.in-addr.arpa domain name pointer static.bb.jpr.117.242.116.164.bsnl.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.116.242.117.in-addr.arpa	name = static.bb.jpr.117.242.116.164.bsnl.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.235.146.218 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-25 19:17:07]
2019-06-26 04:31:48
186.227.37.117 attack
SMTP-sasl brute force
...
2019-06-26 04:34:53
112.35.46.21 attackspam
Jun 25 20:38:56 minden010 sshd[602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
Jun 25 20:38:57 minden010 sshd[602]: Failed password for invalid user paule from 112.35.46.21 port 46904 ssh2
Jun 25 20:40:12 minden010 sshd[1253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.46.21
...
2019-06-26 04:23:03
119.29.11.214 attackbotsspam
Jun 25 21:41:29 ubuntu-2gb-nbg1-dc3-1 sshd[14554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.11.214
Jun 25 21:41:31 ubuntu-2gb-nbg1-dc3-1 sshd[14554]: Failed password for invalid user scan from 119.29.11.214 port 43424 ssh2
...
2019-06-26 04:54:40
45.80.39.230 attack
53413/udp
[2019-06-25]1pkt
2019-06-26 04:44:39
107.170.238.236 attackspam
Automatic report - Web App Attack
2019-06-26 04:34:36
45.125.65.77 attackspambots
2019-06-25T19:24:50.135588ns1.unifynetsol.net postfix/smtpd\[9485\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-25T20:48:45.310097ns1.unifynetsol.net postfix/smtpd\[20774\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-25T22:12:01.813347ns1.unifynetsol.net postfix/smtpd\[31973\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-25T23:33:45.492023ns1.unifynetsol.net postfix/smtpd\[9325\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-26T00:56:17.204703ns1.unifynetsol.net postfix/smtpd\[23698\]: warning: unknown\[45.125.65.77\]: SASL LOGIN authentication failed: authentication failure
2019-06-26 04:36:58
218.92.0.195 attackspambots
2019-06-25T20:27:18.278029abusebot-3.cloudsearch.cf sshd\[28356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.195  user=root
2019-06-26 04:51:04
60.191.20.210 attackspam
Imap
2019-06-26 05:05:21
186.232.146.137 attack
libpam_shield report: forced login attempt
2019-06-26 05:00:13
206.81.11.127 attackspam
web-1 [ssh] SSH Attack
2019-06-26 04:26:44
37.139.2.218 attackspambots
v+ssh-bruteforce
2019-06-26 05:06:23
54.38.82.14 attackspambots
Jun 26 02:45:14 lcl-usvr-02 sshd[31555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
Jun 26 02:45:16 lcl-usvr-02 sshd[31555]: Failed password for root from 54.38.82.14 port 54174 ssh2
...
2019-06-26 04:24:56
84.217.93.92 attackspam
MYH,DEF GET /wp-login.php
2019-06-26 04:57:09
58.250.79.7 attackbotsspam
web-1 [ssh] SSH Attack
2019-06-26 04:59:54

Recently Reported IPs

117.242.116.213 117.242.115.214 117.242.115.77 117.242.117.102
117.242.117.35 117.242.116.26 117.242.117.79 117.242.116.64
117.242.118.145 114.99.22.23 117.242.118.165 117.242.118.17
117.242.118.57 117.242.118.85 117.242.119.114 117.242.118.96
117.242.119.12 117.242.118.200 117.242.119.188 117.242.119.4