Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.108.140.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.108.140.42.			IN	A

;; AUTHORITY SECTION:
.			490	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 14:39:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
42.140.108.101.in-addr.arpa domain name pointer node-roq.pool-101-108.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.140.108.101.in-addr.arpa	name = node-roq.pool-101-108.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.100.13.49 attackspambots
Port probing on unauthorized port 23
2020-10-09 00:11:51
173.33.65.93 attack
Automatic report - Banned IP Access
2020-10-09 00:23:25
185.132.53.14 attackspam
(sshd) Failed SSH login from 185.132.53.14 (DE/Germany/vps32.virtual4host.pt): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  8 11:51:30 server sshd[22256]: Did not receive identification string from 185.132.53.14 port 55218
Oct  8 11:51:58 server sshd[22312]: Failed password for root from 185.132.53.14 port 33202 ssh2
Oct  8 11:52:15 server sshd[22379]: Invalid user oracle from 185.132.53.14 port 33402
Oct  8 11:52:16 server sshd[22379]: Failed password for invalid user oracle from 185.132.53.14 port 33402 ssh2
Oct  8 11:52:35 server sshd[22457]: Failed password for root from 185.132.53.14 port 33592 ssh2
2020-10-09 00:07:57
49.88.112.72 attackbotsspam
SSH break in attempt
...
2020-10-09 00:27:12
167.248.133.24 attackspambots
 TCP (SYN) 167.248.133.24:29101 -> port 16993, len 44
2020-10-09 00:18:43
186.122.149.191 attack
Oct  8 10:52:05 lanister sshd[5776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.191  user=root
Oct  8 10:52:07 lanister sshd[5776]: Failed password for root from 186.122.149.191 port 42762 ssh2
Oct  8 10:56:53 lanister sshd[5835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.149.191  user=root
Oct  8 10:56:55 lanister sshd[5835]: Failed password for root from 186.122.149.191 port 49022 ssh2
2020-10-09 00:04:13
182.151.16.46 attack
SSH_attack
2020-10-09 00:32:25
94.73.56.252 attack
Multiport scan : 4 ports scanned 80(x5) 443(x2) 465(x5) 8080
2020-10-09 00:38:29
185.234.216.247 attackspambots
10 attempts against mh-pma-try-ban on wood
2020-10-09 00:24:30
27.77.202.41 attack
SP-Scan 19211:23 detected 2020.10.07 14:54:47
blocked until 2020.11.26 06:57:34
2020-10-09 00:22:16
211.143.255.70 attackspambots
Oct  8 08:55:39 firewall sshd[22415]: Failed password for root from 211.143.255.70 port 19420 ssh2
Oct  8 09:02:04 firewall sshd[22531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.255.70  user=root
Oct  8 09:02:06 firewall sshd[22531]: Failed password for root from 211.143.255.70 port 59675 ssh2
...
2020-10-09 00:20:53
117.48.196.105 attackspam
SP-Scan 56896:445 detected 2020.10.07 20:06:00
blocked until 2020.11.26 12:08:47
2020-10-09 00:38:02
107.179.226.45 attackbots
"GET /phpmyadmin/index.php?lang=en
2020-10-09 00:03:01
51.222.14.28 attackspambots
51.222.14.28 (FR/France/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  8 17:32:32 server sshd[29149]: Failed password for root from 192.99.55.242 port 48474 ssh2
Oct  8 17:34:30 server sshd[29469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.254.198.67  user=root
Oct  8 17:28:51 server sshd[28601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17  user=root
Oct  8 17:28:53 server sshd[28601]: Failed password for root from 185.74.4.17 port 35373 ssh2
Oct  8 17:30:51 server sshd[28918]: Failed password for root from 51.222.14.28 port 41834 ssh2

IP Addresses Blocked:

192.99.55.242 (CA/Canada/-)
103.254.198.67 (US/United States/-)
185.74.4.17 (UZ/Uzbekistan/-)
2020-10-09 00:12:28
193.169.253.63 attackbots
 TCP (SYN) 193.169.253.63:55064 -> port 25, len 40
2020-10-09 00:01:15

Recently Reported IPs

101.108.14.92 101.108.140.231 101.108.140.67 127.118.178.69
101.108.140.69 101.108.140.7 101.109.31.82 101.108.140.75
101.108.140.98 101.108.141.1 101.108.140.9 101.108.141.185
101.108.141.151 101.108.141.236 101.108.141.8 101.108.141.11
101.108.141.229 101.108.142.175 101.108.142.141 101.109.31.9