Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.4.140.155 attack
unauthorized connection attempt
2020-01-12 17:01:59
1.4.140.166 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:18.
2019-12-21 04:01:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.4.140.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.4.140.146.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 14:28:50 CST 2022
;; MSG SIZE  rcvd: 104
Host info
146.140.4.1.in-addr.arpa domain name pointer node-2he.pool-1-4.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.140.4.1.in-addr.arpa	name = node-2he.pool-1-4.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.123.232.164 attackbotsspam
187.123.232.164 - - [11/Oct/2020:11:41:29 +0100] "POST /wp-login.php HTTP/1.1" 403 221 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.123.232.164 - - [11/Oct/2020:11:41:32 +0100] "POST /wp-login.php HTTP/1.1" 200 2539 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.123.232.164 - - [11/Oct/2020:11:41:35 +0100] "POST /wp-login.php HTTP/1.1" 200 2538 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 00:44:01
195.154.232.205 attackbots
hzb4 195.154.232.205 [11/Oct/2020:03:03:58 "-" "POST /wp-login.php 200 2309
195.154.232.205 [11/Oct/2020:22:17:32 "-" "GET /wp-login.php 200 2189
195.154.232.205 [11/Oct/2020:22:17:34 "-" "POST /wp-login.php 200 2309
2020-10-12 00:14:01
106.13.230.219 attack
(sshd) Failed SSH login from 106.13.230.219 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 11:39:00 optimus sshd[13324]: Invalid user abby from 106.13.230.219
Oct 11 11:39:00 optimus sshd[13324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219 
Oct 11 11:39:02 optimus sshd[13324]: Failed password for invalid user abby from 106.13.230.219 port 37148 ssh2
Oct 11 11:45:23 optimus sshd[15565]: Invalid user luis from 106.13.230.219
Oct 11 11:45:23 optimus sshd[15565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.230.219
2020-10-12 00:05:57
218.92.0.248 attack
2020-10-11T18:39:14.011211lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:18.976335lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:24.405947lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:29.048844lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:32.060356lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
...
2020-10-12 00:06:50
60.100.10.195 attackbots
Port Scan: TCP/443
2020-10-12 00:36:18
107.6.171.130 attackspam
port scan and connect, tcp 443 (https)
2020-10-12 00:39:55
81.68.123.185 attackspambots
(sshd) Failed SSH login from 81.68.123.185 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 16:45:44 server sshd[15143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.123.185  user=root
Oct 11 16:45:45 server sshd[15143]: Failed password for root from 81.68.123.185 port 36286 ssh2
Oct 11 16:54:45 server sshd[16360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.123.185  user=root
Oct 11 16:54:47 server sshd[16360]: Failed password for root from 81.68.123.185 port 37014 ssh2
Oct 11 16:58:31 server sshd[16856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.123.185  user=root
2020-10-12 00:29:04
88.218.17.103 attackspam
 TCP (SYN) 88.218.17.103:41834 -> port 3389, len 44
2020-10-12 00:09:46
120.239.196.94 attackspam
(sshd) Failed SSH login from 120.239.196.94 (CN/China/Guangdong/Guangzhou/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 11 08:14:39 atlas sshd[19662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.94  user=root
Oct 11 08:14:41 atlas sshd[19662]: Failed password for root from 120.239.196.94 port 53520 ssh2
Oct 11 08:26:55 atlas sshd[23119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.94  user=root
Oct 11 08:26:56 atlas sshd[23119]: Failed password for root from 120.239.196.94 port 37896 ssh2
Oct 11 08:29:46 atlas sshd[23705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.239.196.94  user=root
2020-10-12 00:07:46
2.57.122.185 attackbots
 TCP (SYN) 2.57.122.185:38582 -> port 81, len 44
2020-10-12 00:15:47
66.57.151.234 attackbotsspam
Icarus honeypot on github
2020-10-12 00:13:28
5.188.86.174 attack
SSH login attempts.
2020-10-12 00:31:06
221.229.218.40 attackspam
SSH/22 MH Probe, BF, Hack -
2020-10-12 00:10:03
185.220.101.202 attackspam
22 attempts against mh-misbehave-ban on sonic
2020-10-12 00:34:56
81.70.22.100 attackbots
SSH login attempts.
2020-10-12 00:27:46

Recently Reported IPs

1.4.140.126 1.4.140.182 1.4.140.213 1.4.139.66
1.4.139.48 101.109.209.83 1.4.140.221 1.4.140.232
1.4.140.243 1.4.140.254 1.4.140.98 1.4.141.117
1.4.141.144 1.4.141.127 1.4.141.147 1.4.141.189
1.4.141.212 101.109.209.88 1.4.141.7 1.4.141.94