Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Afrihost (Pty) Ltd

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Port Scan: TCP/23
2019-09-14 10:39:27
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.0.217.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46904
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.0.217.216.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091302 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 10:39:19 CST 2019
;; MSG SIZE  rcvd: 117
Host info
216.217.0.169.in-addr.arpa domain name pointer 169-0-217-216.ip.afrihost.co.za.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
216.217.0.169.in-addr.arpa	name = 169-0-217-216.ip.afrihost.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
79.1.80.83 attackspam
Unauthorized connection attempt detected from IP address 79.1.80.83 to port 2220 [J]
2020-01-25 03:00:12
41.64.20.10 attack
Unauthorized connection attempt from IP address 41.64.20.10 on Port 445(SMB)
2020-01-25 02:37:22
83.242.157.71 attackbotsspam
Jan 24 13:33:34 debian-2gb-nbg1-2 kernel: \[2128491.032548\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.242.157.71 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=47 ID=6467 PROTO=TCP SPT=29451 DPT=23 WINDOW=23334 RES=0x00 SYN URGP=0
2020-01-25 02:25:11
81.19.215.202 attackspambots
$f2bV_matches
2020-01-25 02:42:43
5.157.96.66 attackspam
$f2bV_matches
2020-01-25 03:01:12
112.82.215.206 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-01-25 02:27:28
164.132.46.14 attackbots
Unauthorized connection attempt detected from IP address 164.132.46.14 to port 2220 [J]
2020-01-25 02:53:09
185.56.153.231 attack
Unauthorized connection attempt detected from IP address 185.56.153.231 to port 2220 [J]
2020-01-25 02:32:37
103.131.40.24 attackspambots
Wordpress_xmlrpc_attack
2020-01-25 02:44:43
114.67.68.30 attackspam
Unauthorized connection attempt detected from IP address 114.67.68.30 to port 2220 [J]
2020-01-25 02:47:59
14.177.64.87 attack
1579869214 - 01/24/2020 13:33:34 Host: 14.177.64.87/14.177.64.87 Port: 445 TCP Blocked
2020-01-25 02:38:19
49.204.51.191 attackbots
20/1/24@07:33:37: FAIL: Alarm-Network address from=49.204.51.191
20/1/24@07:33:37: FAIL: Alarm-Network address from=49.204.51.191
...
2020-01-25 02:26:12
142.93.232.144 attack
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-01-25 02:47:24
106.13.185.111 attackspambots
SSH Login Bruteforce
2020-01-25 02:42:19
1.56.207.130 attackspambots
$f2bV_matches
2020-01-25 02:43:02

Recently Reported IPs

216.174.24.208 169.232.111.229 250.131.86.57 103.140.194.3
148.1.186.26 101.16.64.83 0.171.113.113 210.185.134.149
95.18.154.158 251.5.192.171 232.231.98.210 81.223.138.158
92.252.165.50 142.214.107.228 205.198.216.153 255.189.5.202
153.123.157.183 53.17.166.130 31.45.174.123 91.191.221.13