Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.49.142.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21962
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.49.142.116.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061901 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 20 15:25:43 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 116.142.49.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 116.142.49.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.136.190.55 attack
Apr 29 01:38:55 mail sshd\[3009\]: Invalid user avi from 152.136.190.55
Apr 29 01:38:55 mail sshd\[3009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.190.55
Apr 29 01:38:56 mail sshd\[3009\]: Failed password for invalid user avi from 152.136.190.55 port 55765 ssh2
...
2020-04-29 07:54:23
129.204.147.84 attack
Invalid user customer from 129.204.147.84 port 39230
2020-04-29 07:50:36
180.211.183.70 attack
Attempted connection to port 445.
2020-04-29 07:22:06
106.13.189.172 attackspambots
SASL PLAIN auth failed: ruser=...
2020-04-29 07:51:09
185.200.118.55 attack
185.200.118.55 was recorded 7 times by 7 hosts attempting to connect to the following ports: 1194. Incident counter (4h, 24h, all-time): 7, 7, 335
2020-04-29 07:30:30
178.236.111.192 attackspam
1588106723 - 04/28/2020 22:45:23 Host: 178.236.111.192/178.236.111.192 Port: 445 TCP Blocked
2020-04-29 07:27:49
46.56.67.180 attackspambots
Unauthorized connection attempt from IP address 46.56.67.180 on Port 445(SMB)
2020-04-29 07:47:34
106.13.105.88 attack
Invalid user search from 106.13.105.88 port 33546
2020-04-29 07:43:10
146.120.244.6 attackspam
WordPress brute force
2020-04-29 07:40:24
178.208.194.55 attackbots
WordPress brute force
2020-04-29 07:35:56
213.27.7.139 attackbots
WordPress brute force
2020-04-29 07:21:19
37.255.75.77 attack
Unauthorized connection attempt from IP address 37.255.75.77 on Port 445(SMB)
2020-04-29 07:34:51
88.21.68.178 attack
Unauthorized connection attempt from IP address 88.21.68.178 on Port 445(SMB)
2020-04-29 07:53:40
164.132.192.5 attackbots
[Aegis] @ 2019-06-02 16:46:34  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-04-29 07:28:57
63.235.138.242 attackbotsspam
Unauthorized connection attempt from IP address 63.235.138.242 on Port 445(SMB)
2020-04-29 07:17:47

Recently Reported IPs

37.138.187.144 87.11.77.215 207.204.11.55 210.221.58.22
58.236.71.19 132.20.103.8 92.53.65.22 206.81.11.215
63.126.76.215 73.154.3.253 191.53.57.153 68.68.15.8
108.153.214.49 113.23.64.25 83.74.236.202 220.26.193.65
177.136.124.37 132.16.68.81 113.238.55.150 61.54.194.128