Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lima

Region: Lima

Country: Peru

Internet Service Provider: unknown

Hostname: unknown

Organization: OPTICAL TECHNOLOGIES S.A.C.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.132.116.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 937
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.132.116.242.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 20:24:59 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 242.116.132.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 242.116.132.161.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
73.159.160.59 spam
they hacked into my private stuff
2020-11-28 11:34:56
223.24.154.47 attack
แฮกเกอรข้อมูล
2020-11-25 16:29:56
40.92.17.46 normal
they want to buy something using paypay -cheaters
2020-11-26 18:12:55
185.63.253.205 spamproxy
Pplp
2020-11-24 04:57:09
151.236.35.245 attack
Trying to hack my NAS
2020-12-01 11:15:57
23.106.123.128 spam
IP address show up multiple times in DMARC report as a failed email spoofing attempt.
2020-12-01 07:10:42
95.217.62.98 attack
RDP/RDS attack from this IP.
2020-11-28 17:59:02
83.120.36.145 spambotsattackproxynormal
عالیه
2020-11-25 20:49:03
212.47.138.207 spambotsproxynormal
Fd snae we h few and we be too
2020-11-30 07:14:47
183.63.253.200 spambotsattackproxynormal
183.63.253.200
2020-12-02 05:18:28
167.172.246.83 botsattackproxy
This IP tried to connect to my server several times, and then my server was infested with processes pointing cpupower.mine.zergpool.com:4250 consuming all the RAM of my server and caused my database to crash
2020-11-28 04:15:54
217.163.30.151 normal
Phillipines manila 

1915 A.campillo st paco malate  manila
2020-12-01 09:50:31
185.63.253.200 spambotsattackproxynormal
Watinsunem
2020-12-01 06:12:23
115.124.96.127 spamattack
ok
2020-11-25 23:07:50
154.28.188.57 attack
Qnap login attempts using admin
2020-11-24 06:37:01

Recently Reported IPs

41.215.208.138 68.183.105.109 85.160.29.155 41.204.33.38
31.250.176.22 41.139.253.2 44.210.217.189 82.165.159.133
37.49.224.122 139.115.244.134 37.49.225.61 37.120.146.57
199.250.240.125 162.144.70.140 154.158.80.116 37.49.225.241
53.163.60.255 37.49.225.224 176.8.91.216 220.31.170.210