Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.242.126.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.242.126.193.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:51:03 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 193.126.242.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.242.126.193.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.248 attackbots
Unauthorized connection attempt detected from IP address 222.186.30.248 to port 22 [T]
2020-01-25 07:39:14
178.222.221.193 attackspambots
Honeypot attack, port: 81, PTR: 178-222-221-193.dynamic.isp.telekom.rs.
2020-01-25 07:42:20
49.233.185.68 attackbotsspam
Unauthorized connection attempt detected from IP address 49.233.185.68 to port 2220 [J]
2020-01-25 07:43:53
94.53.184.169 attack
Automatic report - Port Scan Attack
2020-01-25 07:34:26
117.144.189.69 attackspambots
Invalid user jjj from 117.144.189.69 port 56758
2020-01-25 07:40:32
222.186.173.226 attack
Jan 24 13:35:00 sachi sshd\[20712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Jan 24 13:35:02 sachi sshd\[20712\]: Failed password for root from 222.186.173.226 port 6275 ssh2
Jan 24 13:35:18 sachi sshd\[20739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Jan 24 13:35:20 sachi sshd\[20739\]: Failed password for root from 222.186.173.226 port 54554 ssh2
Jan 24 13:35:22 sachi sshd\[20739\]: Failed password for root from 222.186.173.226 port 54554 ssh2
2020-01-25 07:37:59
170.80.47.164 attackspambots
Honeypot attack, port: 5555, PTR: 170-80-47-164.clnt-home.surubiminternet.com.br.
2020-01-25 07:17:45
180.250.115.121 attack
Unauthorized connection attempt detected from IP address 180.250.115.121 to port 2220 [J]
2020-01-25 07:44:38
120.133.236.138 attackspambots
Invalid user hadoop from 120.133.236.138 port 41514
2020-01-25 07:46:06
46.22.224.50 attackspam
firewall-block, port(s): 1433/tcp
2020-01-25 07:45:51
114.113.126.163 attackbots
Jan 25 00:06:49 sd-53420 sshd\[29882\]: User root from 114.113.126.163 not allowed because none of user's groups are listed in AllowGroups
Jan 25 00:06:49 sd-53420 sshd\[29882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.113.126.163  user=root
Jan 25 00:06:50 sd-53420 sshd\[29882\]: Failed password for invalid user root from 114.113.126.163 port 34597 ssh2
Jan 25 00:13:05 sd-53420 sshd\[30863\]: Invalid user nisa from 114.113.126.163
Jan 25 00:13:05 sd-53420 sshd\[30863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.113.126.163
...
2020-01-25 07:21:09
170.247.1.50 attackbotsspam
SSH invalid-user multiple login try
2020-01-25 07:22:57
189.46.63.114 attackspam
Honeypot attack, port: 445, PTR: 189-46-63-114.dsl.telesp.net.br.
2020-01-25 07:24:20
208.81.163.110 attack
Jan 24 22:16:19 ns3042688 sshd\[22006\]: Invalid user brecht from 208.81.163.110
Jan 24 22:16:21 ns3042688 sshd\[22006\]: Failed password for invalid user brecht from 208.81.163.110 port 56962 ssh2
Jan 24 22:17:43 ns3042688 sshd\[22068\]: Invalid user df from 208.81.163.110
Jan 24 22:17:45 ns3042688 sshd\[22068\]: Failed password for invalid user df from 208.81.163.110 port 41056 ssh2
Jan 24 22:19:16 ns3042688 sshd\[22192\]: Failed password for root from 208.81.163.110 port 53378 ssh2
...
2020-01-25 07:03:53
51.68.201.21 attack
Port scan on 2 port(s): 139 445
2020-01-25 07:26:34

Recently Reported IPs

196.243.22.202 200.150.36.163 33.71.92.80 31.145.166.205
205.244.36.187 117.230.107.210 228.36.15.49 208.83.133.177
107.91.222.171 76.141.62.111 48.160.36.238 7.117.1.189
217.104.2.245 219.119.246.185 160.111.29.104 21.106.107.229
66.115.183.198 87.188.167.206 74.130.159.235 228.101.184.131