Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Queens

Region: New York

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.38.85.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60681
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;100.38.85.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 14:06:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
140.85.38.100.in-addr.arpa domain name pointer pool-100-38-85-140.nycmny.fios.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.85.38.100.in-addr.arpa	name = pool-100-38-85-140.nycmny.fios.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.91.77.202 attackspambots
firewall-block, port(s): 22263/tcp
2020-09-22 03:44:10
103.210.237.163 attack
(sshd) Failed SSH login from 103.210.237.163 (HK/Hong Kong/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 21 14:28:12 server5 sshd[19814]: Invalid user ubuntu from 103.210.237.163
Sep 21 14:28:12 server5 sshd[19814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.237.163 
Sep 21 14:28:14 server5 sshd[19814]: Failed password for invalid user ubuntu from 103.210.237.163 port 46682 ssh2
Sep 21 14:46:38 server5 sshd[27788]: Invalid user dl from 103.210.237.163
Sep 21 14:46:38 server5 sshd[27788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.237.163
2020-09-22 04:06:58
106.12.133.38 attack
Brute-force attempt banned
2020-09-22 03:39:36
97.93.249.185 attack
Automatic report - Port Scan Attack
2020-09-22 03:39:50
46.101.40.21 attack
Sep 21 13:59:46 ws22vmsma01 sshd[66954]: Failed password for root from 46.101.40.21 port 60576 ssh2
...
2020-09-22 03:49:13
223.85.205.58 attackspam
Icarus honeypot on github
2020-09-22 03:38:45
104.131.84.222 attackbots
Bruteforce detected by fail2ban
2020-09-22 03:46:24
139.162.137.207 attackbots
*Port Scan* detected from 139.162.137.207 (DE/Germany/Hesse/Frankfurt am Main/li1403-207.members.linode.com). 4 hits in the last 66 seconds
2020-09-22 03:35:06
42.224.1.184 attackspam
" "
2020-09-22 03:36:04
150.242.98.199 attackbotsspam
Brute force attempt
2020-09-22 04:03:29
112.85.42.176 attackspambots
Sep 21 21:40:15 ip106 sshd[28368]: Failed password for root from 112.85.42.176 port 5355 ssh2
Sep 21 21:40:18 ip106 sshd[28368]: Failed password for root from 112.85.42.176 port 5355 ssh2
...
2020-09-22 03:41:30
49.234.18.158 attackbots
Time:     Mon Sep 21 21:25:08 2020 +0200
IP:       49.234.18.158 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 21 21:08:16 mail sshd[10548]: Invalid user sysadm from 49.234.18.158 port 52748
Sep 21 21:08:18 mail sshd[10548]: Failed password for invalid user sysadm from 49.234.18.158 port 52748 ssh2
Sep 21 21:21:45 mail sshd[11299]: Invalid user wiki from 49.234.18.158 port 44644
Sep 21 21:21:46 mail sshd[11299]: Failed password for invalid user wiki from 49.234.18.158 port 44644 ssh2
Sep 21 21:25:06 mail sshd[11497]: Invalid user s1 from 49.234.18.158 port 37452
2020-09-22 04:07:54
119.29.247.187 attackspam
2020-09-21T15:45:30.109087shield sshd\[23089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.247.187  user=root
2020-09-21T15:45:32.606815shield sshd\[23089\]: Failed password for root from 119.29.247.187 port 42234 ssh2
2020-09-21T15:47:32.792626shield sshd\[23281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.247.187  user=root
2020-09-21T15:47:35.039400shield sshd\[23281\]: Failed password for root from 119.29.247.187 port 34822 ssh2
2020-09-21T15:49:35.056054shield sshd\[23460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.247.187  user=root
2020-09-22 03:43:30
222.186.173.201 attackbots
Sep 21 21:44:53 db sshd[24812]: User root from 222.186.173.201 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-22 03:54:21
104.236.72.182 attackspam
srv02 Mass scanning activity detected Target: 20991  ..
2020-09-22 03:53:09

Recently Reported IPs

8.19.10.152 247.99.74.117 244.224.229.77 55.248.249.120
194.249.245.103 174.137.116.82 217.84.197.113 13.254.161.58
93.71.86.79 255.6.198.6 149.53.58.142 152.115.41.72
29.32.99.246 181.222.173.39 136.18.224.248 165.200.128.104
176.220.54.141 124.58.175.152 43.103.233.113 189.215.138.254