Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.116.34.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.116.34.238.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 15:55:55 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 238.34.116.216.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 216.116.34.238.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
139.59.84.111 attack
Oct 27 20:26:31 marvibiene sshd[3129]: Invalid user mack from 139.59.84.111 port 49652
Oct 27 20:26:31 marvibiene sshd[3129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.111
Oct 27 20:26:31 marvibiene sshd[3129]: Invalid user mack from 139.59.84.111 port 49652
Oct 27 20:26:33 marvibiene sshd[3129]: Failed password for invalid user mack from 139.59.84.111 port 49652 ssh2
...
2019-10-28 06:56:10
185.209.0.16 attack
ET DROP Dshield Block Listed Source group 1 - port: 3791 proto: TCP cat: Misc Attack
2019-10-28 07:17:57
113.173.117.191 attackspambots
Unauthorized IMAP connection attempt
2019-10-28 07:02:13
51.68.230.54 attack
Oct 27 20:38:48 sshgateway sshd\[26449\]: Invalid user www from 51.68.230.54
Oct 27 20:38:48 sshgateway sshd\[26449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.230.54
Oct 27 20:38:51 sshgateway sshd\[26449\]: Failed password for invalid user www from 51.68.230.54 port 54490 ssh2
2019-10-28 07:04:25
159.203.201.32 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 8983 proto: TCP cat: Misc Attack
2019-10-28 07:23:34
92.119.160.143 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-28 07:27:37
27.210.164.138 attack
Automatic report - Port Scan Attack
2019-10-28 07:06:08
54.36.150.80 attackspambots
Automatic report - Banned IP Access
2019-10-28 06:52:00
185.209.0.31 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-28 07:01:23
182.61.33.137 attackspambots
Oct 27 21:26:19 MK-Soft-VM6 sshd[27683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.137 
Oct 27 21:26:21 MK-Soft-VM6 sshd[27683]: Failed password for invalid user kernoops from 182.61.33.137 port 43622 ssh2
...
2019-10-28 07:01:50
150.109.51.105 attackbots
Oct 27 12:34:38 php1 sshd\[24300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.51.105  user=root
Oct 27 12:34:40 php1 sshd\[24300\]: Failed password for root from 150.109.51.105 port 48980 ssh2
Oct 27 12:38:31 php1 sshd\[24748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.51.105  user=root
Oct 27 12:38:33 php1 sshd\[24748\]: Failed password for root from 150.109.51.105 port 36007 ssh2
Oct 27 12:42:29 php1 sshd\[25369\]: Invalid user ubnt from 150.109.51.105
Oct 27 12:42:29 php1 sshd\[25369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.51.105
2019-10-28 07:00:59
180.119.109.62 attack
Oct 27 08:53:55 noisternig postfix/smtpd[23350]: connect from unknown[180.119.109.62]
Oct 27 08:53:56 noisternig postfix/smtpd[23366]: connect from unknown[180.119.109.62]
Oct x@x
Oct 27 08:53:57 noisternig postfix/smtpd[23350]: lost connection after RCPT from unknown[180.119.109.62]
Oct 27 08:53:57 noisternig postfix/smtpd[23350]: disconnect from unknown[180.119.109.62]
Oct x@x
Oct 27 08:53:58 noisternig postfix/smtpd[23366]: lost connection after RCPT from unknown[180.119.109.62]
Oct 27 08:53:58 noisternig postfix/smtpd[23366]: disconnect from unknown[180.119.109.62]
Oct 27 09:14:57 noisternig postfix/smtpd[24249]: connect from unknown[180.119.109.62]
Oct 27 09:14:57 noisternig postfix/smtpd[24112]: connect from unknown[180.119.109.62]
Oct x@x
Oct x@x
Oct 27 09:14:58 noisternig postfix/smtpd[24112]: lost connection after RCPT from unknown[180.119.109.62]
Oct 27 09:14:58 noisternig postfix/smtpd[24112]: disconnect from unknown[180.119.109.62]
Oct 27 09:14:58 noisternig ........
------------------------------
2019-10-28 06:53:53
162.144.38.13 attack
Lines containing failures of 162.144.38.13
Oct 27 12:35:07 shared04 sshd[12994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.38.13  user=r.r
Oct 27 12:35:08 shared04 sshd[12994]: Failed password for r.r from 162.144.38.13 port 41898 ssh2
Oct 27 12:35:08 shared04 sshd[12994]: Received disconnect from 162.144.38.13 port 41898:11: Bye Bye [preauth]
Oct 27 12:35:08 shared04 sshd[12994]: Disconnected from authenticating user r.r 162.144.38.13 port 41898 [preauth]
Oct 27 12:55:55 shared04 sshd[17945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.38.13  user=r.r
Oct 27 12:55:57 shared04 sshd[17945]: Failed password for r.r from 162.144.38.13 port 58052 ssh2
Oct 27 12:55:57 shared04 sshd[17945]: Received disconnect from 162.144.38.13 port 58052:11: Bye Bye [preauth]
Oct 27 12:55:57 shared04 sshd[17945]: Disconnected from authenticating user r.r 162.144.38.13 port 58052 [preauth........
------------------------------
2019-10-28 06:59:47
103.63.2.192 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:26:37
104.140.188.54 attackbotsspam
ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic
2019-10-28 07:25:48

Recently Reported IPs

166.17.59.161 199.199.47.183 189.161.243.137 228.133.103.219
96.140.37.241 18.119.43.88 157.32.184.80 250.84.102.117
149.133.251.94 141.104.55.218 45.135.221.27 147.151.169.2
83.233.177.27 202.12.57.0 87.77.97.240 212.187.97.121
156.191.16.111 170.160.16.176 203.143.137.75 174.118.61.205