Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.113.42.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.113.42.16.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:37:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 16.42.113.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.42.113.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.109.113.127 attackspam
Sep 22 20:26:24 s64-1 sshd[9457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127
Sep 22 20:26:26 s64-1 sshd[9457]: Failed password for invalid user viet from 150.109.113.127 port 32946 ssh2
Sep 22 20:30:57 s64-1 sshd[9564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.113.127
...
2019-09-23 02:34:07
189.3.152.194 attackspambots
Sep 22 23:41:37 areeb-Workstation sshd[19307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.3.152.194
Sep 22 23:41:39 areeb-Workstation sshd[19307]: Failed password for invalid user tom from 189.3.152.194 port 40895 ssh2
...
2019-09-23 02:12:08
213.159.210.154 attackbotsspam
Sep 22 20:22:33 mail sshd\[5856\]: Invalid user openfiler from 213.159.210.154
Sep 22 20:22:33 mail sshd\[5856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.159.210.154
Sep 22 20:22:35 mail sshd\[5856\]: Failed password for invalid user openfiler from 213.159.210.154 port 56680 ssh2
...
2019-09-23 02:29:49
185.243.180.157 attackbots
Sep 22 21:51:44 our-server-hostname postfix/smtpd[16463]: connect from unknown[185.243.180.157]
Sep 22 21:51:50 our-server-hostname sqlgrey: grey: new: 185.243.180.157(185.243.180.157), x@x -> x@x
Sep x@x
Sep x@x
Sep x@x
Sep 22 21:51:57 our-server-hostname sqlgrey: grey: new: 185.243.180.157(185.243.180.157), x@x -> x@x
Sep x@x
Sep x@x
Sep x@x
Sep 22 21:51:58 our-server-hostname sqlgrey: grey: new: 185.243.180.157(185.243.180.157), x@x -> x@x
Sep x@x
Sep x@x
Sep x@x
Sep 22 21:52:00 our-server-hostname sqlgrey: grey: new: 185.243.180.157(185.243.180.157), x@x -> x@x
Sep x@x
Sep x@x
Sep x@x
Sep 22 21:52:01 our-server-hostname postfix/smtpd[16463]: disconnect from unknown[185.243.180.157]
Sep 22 21:52:43 our-server-hostname postfix/smtpd[17233]: connect from unknown[185.243.180.157]
Sep 22 21:52:44 our-server-hostname postfix/smtpd[18158]: connect from unknown[185.243.180.157]
Sep x@x
Sep x@x
Sep 22 21:52:44 our-server-hostname postfix/smtpd[17233]: E230EA40010: client=unk........
-------------------------------
2019-09-23 02:07:49
24.120.10.18 attack
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:32 +0200] "POST /[munged]: HTTP/1.1" 200 5244 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:33 +0200] "POST /[munged]: HTTP/1.1" 200 5231 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:34 +0200] "POST /[munged]: HTTP/1.1" 200 5231 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:35 +0200] "POST /[munged]: HTTP/1.1" 200 5235 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:37 +0200] "POST /[munged]: HTTP/1.1" 200 5231 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 24.120.10.18 - - [22/Sep/2019:14:40:38 +0200] "POST
2019-09-23 02:39:41
178.48.16.181 attackspambots
Sep 22 14:53:47 eventyay sshd[22793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.16.181
Sep 22 14:53:50 eventyay sshd[22793]: Failed password for invalid user 1q2w3e4r from 178.48.16.181 port 17121 ssh2
Sep 22 14:57:59 eventyay sshd[22913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.16.181
...
2019-09-23 02:05:20
203.186.57.191 attack
DATE:2019-09-22 19:22:14, IP:203.186.57.191, PORT:ssh SSH brute force auth (thor)
2019-09-23 02:45:05
51.255.39.143 attackbotsspam
Sep 22 19:20:44 MK-Soft-VM5 sshd[21095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.39.143 
Sep 22 19:20:46 MK-Soft-VM5 sshd[21095]: Failed password for invalid user vu from 51.255.39.143 port 42958 ssh2
...
2019-09-23 02:19:04
192.227.252.17 attack
Sep 22 19:50:48 mail sshd\[5369\]: Invalid user by from 192.227.252.17
Sep 22 19:50:48 mail sshd\[5369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.17
Sep 22 19:50:50 mail sshd\[5369\]: Failed password for invalid user by from 192.227.252.17 port 51204 ssh2
...
2019-09-23 02:33:49
51.38.49.140 attackbots
Sep 22 18:47:43 pornomens sshd\[23532\]: Invalid user mahendra from 51.38.49.140 port 58574
Sep 22 18:47:43 pornomens sshd\[23532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.49.140
Sep 22 18:47:45 pornomens sshd\[23532\]: Failed password for invalid user mahendra from 51.38.49.140 port 58574 ssh2
...
2019-09-23 02:10:55
106.13.33.181 attackbotsspam
Sep 22 17:59:35 hcbbdb sshd\[25426\]: Invalid user minecraft from 106.13.33.181
Sep 22 17:59:35 hcbbdb sshd\[25426\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.33.181
Sep 22 17:59:37 hcbbdb sshd\[25426\]: Failed password for invalid user minecraft from 106.13.33.181 port 47566 ssh2
Sep 22 18:04:09 hcbbdb sshd\[25931\]: Invalid user b from 106.13.33.181
Sep 22 18:04:09 hcbbdb sshd\[25931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.33.181
2019-09-23 02:09:21
165.22.16.90 attackspambots
2019-08-12 04:23:19,730 fail2ban.actions        [791]: NOTICE  [sshd] Ban 165.22.16.90
2019-08-12 07:31:28,488 fail2ban.actions        [791]: NOTICE  [sshd] Ban 165.22.16.90
2019-08-12 10:35:54,517 fail2ban.actions        [791]: NOTICE  [sshd] Ban 165.22.16.90
...
2019-09-23 02:13:17
51.15.167.124 attackspambots
2019-09-19 08:25:05,558 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 51.15.167.124
2019-09-19 08:57:36,704 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 51.15.167.124
2019-09-19 09:31:33,000 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 51.15.167.124
2019-09-19 10:03:39,737 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 51.15.167.124
2019-09-19 10:35:19,379 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 51.15.167.124
...
2019-09-23 02:32:05
222.127.99.45 attackspam
Sep 22 07:11:30 friendsofhawaii sshd\[21616\]: Invalid user art from 222.127.99.45
Sep 22 07:11:30 friendsofhawaii sshd\[21616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.99.45
Sep 22 07:11:33 friendsofhawaii sshd\[21616\]: Failed password for invalid user art from 222.127.99.45 port 50068 ssh2
Sep 22 07:16:44 friendsofhawaii sshd\[22083\]: Invalid user support from 222.127.99.45
Sep 22 07:16:44 friendsofhawaii sshd\[22083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.127.99.45
2019-09-23 02:42:59
51.68.189.69 attackbots
2019-09-22 02:27:20,107 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.68.189.69
2019-09-22 05:32:54,435 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.68.189.69
2019-09-22 08:41:03,499 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.68.189.69
...
2019-09-23 02:22:42

Recently Reported IPs

179.35.206.200 51.198.118.86 109.227.193.226 249.5.100.244
190.86.72.7 4.124.161.224 158.62.45.13 80.214.56.243
237.37.175.176 9.78.26.166 16.138.62.100 178.104.192.47
69.42.35.152 139.70.252.238 223.179.122.99 21.110.236.50
142.99.236.13 23.154.13.61 138.243.171.252 86.193.155.69