Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.60.16.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.60.16.108.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 21:03:50 CST 2025
;; MSG SIZE  rcvd: 105
Host info
108.16.60.42.in-addr.arpa domain name pointer bb42-60-16-108.singnet.com.sg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.16.60.42.in-addr.arpa	name = bb42-60-16-108.singnet.com.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.241.212.132 attackbotsspam
[Wed Jul 01 01:01:19 2020] - DDoS Attack From IP: 192.241.212.132 Port: 49463
2020-07-13 01:59:41
159.89.124.210 attackbotsspam
[Sun Jul 05 00:39:02 2020] - DDoS Attack From IP: 159.89.124.210 Port: 54738
2020-07-13 01:36:45
117.50.34.131 attackspam
Jul 12 14:57:15 dev0-dcde-rnet sshd[12766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.34.131
Jul 12 14:57:17 dev0-dcde-rnet sshd[12766]: Failed password for invalid user solange from 117.50.34.131 port 54254 ssh2
Jul 12 15:05:58 dev0-dcde-rnet sshd[12821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.34.131
2020-07-13 01:48:22
190.186.42.130 attack
Automatic report BANNED IP
2020-07-13 02:00:21
134.175.59.225 attackbots
Jul 12 14:27:14 vps639187 sshd\[18820\]: Invalid user gill from 134.175.59.225 port 44542
Jul 12 14:27:14 vps639187 sshd\[18820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.59.225
Jul 12 14:27:17 vps639187 sshd\[18820\]: Failed password for invalid user gill from 134.175.59.225 port 44542 ssh2
...
2020-07-13 01:30:38
181.40.73.86 attack
SSH Brute-Force reported by Fail2Ban
2020-07-13 01:35:55
108.59.0.103 attackspam
 UDP 108.59.0.103:5078 -> port 42066, len 439
2020-07-13 01:39:41
150.109.23.183 attack
[Sat Jul 04 09:56:30 2020] - DDoS Attack From IP: 150.109.23.183 Port: 36270
2020-07-13 01:41:16
209.141.58.20 attackbots
2020-07-12T18:52:23.720336ks3355764 sshd[19230]: Invalid user guest from 209.141.58.20 port 46952
2020-07-12T18:52:23.736944ks3355764 sshd[19232]: Invalid user admin from 209.141.58.20 port 46958
...
2020-07-13 01:26:32
14.225.17.9 attack
SSH Brute-Forcing (server2)
2020-07-13 01:56:45
222.186.31.83 attackspambots
Unauthorized connection attempt detected from IP address 222.186.31.83 to port 22 [T]
2020-07-13 01:44:05
66.70.173.63 attackspambots
Jul 12 16:39:03 server sshd[7318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.173.63
Jul 12 16:39:05 server sshd[7318]: Failed password for invalid user zhongyang from 66.70.173.63 port 41738 ssh2
Jul 12 16:42:58 server sshd[7547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.173.63
...
2020-07-13 01:26:05
153.122.160.3 attackspam
Jul 12 15:30:58 vps639187 sshd\[20313\]: Invalid user melchor from 153.122.160.3 port 12767
Jul 12 15:30:58 vps639187 sshd\[20313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.122.160.3
Jul 12 15:31:01 vps639187 sshd\[20313\]: Failed password for invalid user melchor from 153.122.160.3 port 12767 ssh2
...
2020-07-13 01:26:47
106.51.80.198 attack
2020-07-12T18:28:38.546295+02:00  sshd[19111]: Failed password for invalid user ino from 106.51.80.198 port 34120 ssh2
2020-07-13 01:48:45
211.192.36.99 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-07-13 01:49:16

Recently Reported IPs

157.120.12.204 142.65.100.122 17.196.122.201 49.94.226.110
122.167.167.196 137.93.22.15 175.64.227.194 35.11.125.172
57.219.87.78 132.13.83.253 43.111.133.215 228.137.18.13
221.167.175.5 48.26.163.254 190.41.214.82 161.160.71.4
128.95.1.234 143.12.129.113 26.180.24.185 9.208.3.202