Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ban Phan Don

Region: Udon Thani

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.2.140.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.2.140.220.			IN	A

;; AUTHORITY SECTION:
.			548	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 08:42:47 CST 2022
;; MSG SIZE  rcvd: 104
Host info
220.140.2.1.in-addr.arpa domain name pointer node-2jg.pool-1-2.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
220.140.2.1.in-addr.arpa	name = node-2jg.pool-1-2.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.3.146.111 attackbots
Excessive Port-Scanning
2020-04-19 16:42:04
162.248.52.82 attackbots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-04-19 16:58:24
151.80.42.186 attackbots
Invalid user test from 151.80.42.186 port 55806
2020-04-19 17:03:06
36.67.106.109 attack
sshd jail - ssh hack attempt
2020-04-19 16:23:52
113.31.108.75 attackspambots
Apr 19 13:24:42 itv-usvr-01 sshd[6822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.108.75  user=root
Apr 19 13:24:45 itv-usvr-01 sshd[6822]: Failed password for root from 113.31.108.75 port 41400 ssh2
Apr 19 13:31:15 itv-usvr-01 sshd[7118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.108.75  user=root
Apr 19 13:31:16 itv-usvr-01 sshd[7118]: Failed password for root from 113.31.108.75 port 39184 ssh2
Apr 19 13:33:01 itv-usvr-01 sshd[7160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.108.75  user=root
Apr 19 13:33:03 itv-usvr-01 sshd[7160]: Failed password for root from 113.31.108.75 port 53856 ssh2
2020-04-19 16:59:38
49.233.142.63 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2020-04-19 16:51:57
121.229.19.200 attack
Apr 19 07:14:47 meumeu sshd[26798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.19.200 
Apr 19 07:14:49 meumeu sshd[26798]: Failed password for invalid user testmail from 121.229.19.200 port 59990 ssh2
Apr 19 07:20:03 meumeu sshd[27702]: Failed password for root from 121.229.19.200 port 37304 ssh2
...
2020-04-19 16:29:55
111.229.78.120 attackbotsspam
Apr 19 07:28:22 cloud sshd[3447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.78.120 
Apr 19 07:28:24 cloud sshd[3447]: Failed password for invalid user test1 from 111.229.78.120 port 53506 ssh2
2020-04-19 17:00:08
104.236.175.127 attackspam
$f2bV_matches
2020-04-19 17:01:01
128.199.81.66 attackbots
Apr 19 07:59:58 cloud sshd[4005]: Failed password for root from 128.199.81.66 port 38528 ssh2
2020-04-19 16:49:46
103.210.170.8 attackspam
Brute force attempt
2020-04-19 16:37:06
165.22.33.32 attackbots
$f2bV_matches
2020-04-19 16:50:25
116.75.168.218 attackbots
Apr 18 21:12:39 mockhub sshd[1550]: Failed password for root from 116.75.168.218 port 59762 ssh2
...
2020-04-19 16:51:31
24.36.116.121 attackspam
Apr 19 08:39:56 ws25vmsma01 sshd[123946]: Failed password for root from 24.36.116.121 port 58010 ssh2
Apr 19 08:48:04 ws25vmsma01 sshd[126707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.36.116.121
...
2020-04-19 17:06:25
111.229.57.138 attackbotsspam
$f2bV_matches
2020-04-19 16:36:37

Recently Reported IPs

1.2.140.214 1.2.140.222 1.2.140.224 1.2.140.227
226.121.91.11 122.29.9.42 1.2.158.251 1.2.158.36
1.2.158.41 1.2.158.52 1.2.159.113 1.2.159.116
1.2.159.118 1.2.159.180 1.2.159.182 1.2.159.205
1.2.159.21 1.2.159.241 1.2.169.12 1.2.169.120