Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.52.172.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.52.172.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:16:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.172.52.16.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.172.52.16.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.89.28.45 attackspambots
SSH Invalid Login
2020-06-18 07:47:34
185.220.103.6 attack
Jun 18 01:25:31 prod4 sshd\[29201\]: Invalid user abell from 185.220.103.6
Jun 18 01:25:32 prod4 sshd\[29201\]: Failed password for invalid user abell from 185.220.103.6 port 43784 ssh2
Jun 18 01:25:35 prod4 sshd\[29201\]: Failed password for invalid user abell from 185.220.103.6 port 43784 ssh2
...
2020-06-18 07:30:37
18.208.229.211 attack
Invalid user liwei from 18.208.229.211 port 48332
2020-06-18 07:45:53
36.67.197.52 attack
Invalid user xiaojie from 36.67.197.52 port 57986
2020-06-18 08:06:47
27.78.108.203 attackbots
Invalid user ubnt from 27.78.108.203 port 53444
2020-06-18 07:45:09
106.52.49.103 attack
Invalid user deploy from 106.52.49.103 port 58248
2020-06-18 07:38:05
60.206.36.141 attack
Invalid user hannes from 60.206.36.141 port 57234
2020-06-18 07:42:24
3.14.69.125 attackspam
SASL PLAIN auth failed: ruser=...
2020-06-18 07:58:06
2.50.171.116 attackspambots
Tried our host z.
2020-06-18 08:05:43
41.39.71.179 attackspambots
 TCP (SYN) 41.39.71.179:45728 -> port 1433, len 44
2020-06-18 08:05:22
59.124.90.231 attackbotsspam
Jun 18 01:39:13 hosting sshd[17586]: Invalid user sasi from 59.124.90.231 port 49584
...
2020-06-18 07:24:26
130.105.205.76 attackbots
Invalid user ubnt from 130.105.205.76 port 54653
2020-06-18 07:34:32
43.243.127.40 attackbotsspam
Jun 18 00:51:12 melroy-server sshd[19669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.127.40 
Jun 18 00:51:13 melroy-server sshd[19669]: Failed password for invalid user automation from 43.243.127.40 port 60194 ssh2
...
2020-06-18 07:44:41
210.211.107.3 attackbots
Jun 17 19:23:06 vps639187 sshd\[31824\]: Invalid user jobs from 210.211.107.3 port 54606
Jun 17 19:23:06 vps639187 sshd\[31824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.211.107.3
Jun 17 19:23:07 vps639187 sshd\[31824\]: Failed password for invalid user jobs from 210.211.107.3 port 54606 ssh2
...
2020-06-18 08:07:15
54.38.159.56 attackbots
Invalid user admin from 54.38.159.56 port 35072
2020-06-18 07:42:52

Recently Reported IPs

229.125.54.74 47.234.250.224 210.39.12.136 120.133.69.124
155.21.228.235 168.113.229.95 99.183.47.220 81.233.187.205
235.101.183.173 22.222.172.201 96.223.168.81 127.112.242.178
134.89.128.29 238.80.241.60 80.52.66.87 30.181.144.173
131.195.122.242 137.60.149.140 9.14.178.178 116.81.172.133