Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.242.143.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.242.143.116.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 151 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:53:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 116.143.242.161.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 161.242.143.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.68.122.216 attack
Brute force SMTP login attempted.
...
2019-07-09 01:15:05
189.91.4.186 attackbots
Brute force attempt
2019-07-09 01:13:58
185.143.223.133 attackspam
8080/tcp 8080/tcp
[2019-07-08]2pkt
2019-07-09 01:46:06
203.245.9.139 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-09 01:47:45
212.182.87.115 attackspambots
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-09 01:42:36
61.160.194.208 attack
404 NOT FOUND
2019-07-09 01:34:20
180.243.19.20 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 07:48:02,271 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.243.19.20)
2019-07-09 01:08:50
41.205.196.102 attackspambots
Jul  8 10:13:23 ns37 sshd[13494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.205.196.102
Jul  8 10:13:25 ns37 sshd[13494]: Failed password for invalid user wesley from 41.205.196.102 port 39092 ssh2
Jul  8 10:15:39 ns37 sshd[13632]: Failed password for root from 41.205.196.102 port 52344 ssh2
2019-07-09 01:10:35
217.133.99.111 attackbotsspam
Jul  8 12:01:47 ns37 sshd[21852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.99.111
Jul  8 12:01:50 ns37 sshd[21852]: Failed password for invalid user dpn from 217.133.99.111 port 52073 ssh2
Jul  8 12:06:31 ns37 sshd[22070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.133.99.111
2019-07-09 01:15:32
144.217.255.89 attack
v+ssh-bruteforce
2019-07-09 01:53:05
216.244.66.238 attackbotsspam
login attempts
2019-07-09 01:53:25
77.42.76.178 attackspambots
port scan and connect, tcp 23 (telnet)
2019-07-09 01:59:23
193.112.121.99 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-09 02:07:27
5.148.3.212 attackbots
Jul  8 04:31:10 plusreed sshd[19112]: Invalid user deployer from 5.148.3.212
Jul  8 04:31:10 plusreed sshd[19112]: Invalid user deployer from 5.148.3.212
Jul  8 04:31:10 plusreed sshd[19112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212
Jul  8 04:31:10 plusreed sshd[19112]: Invalid user deployer from 5.148.3.212
Jul  8 04:31:12 plusreed sshd[19112]: Failed password for invalid user deployer from 5.148.3.212 port 38686 ssh2
...
2019-07-09 01:56:21
198.108.67.48 attack
HTTP/80/443 Probe, BF, WP, Hack -
2019-07-09 02:03:59

Recently Reported IPs

175.174.41.183 129.126.213.232 201.61.24.247 169.166.253.224
26.13.97.65 93.107.28.83 13.111.89.88 164.249.228.36
18.230.101.251 54.181.128.76 231.172.195.45 251.183.253.54
191.18.180.252 38.61.154.154 217.10.196.249 103.136.98.45
202.30.174.240 86.222.202.158 120.219.122.197 178.197.176.36