Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.140.180.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.140.180.14.			IN	A

;; AUTHORITY SECTION:
.			105	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 493 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 02:52:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
14.180.140.103.in-addr.arpa domain name pointer ns1.data-edge.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.180.140.103.in-addr.arpa	name = ns1.data-edge.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.29.119.151 attackspam
Reported by AbuseIPDB proxy server.
2019-09-10 07:05:22
120.88.185.39 attack
SSH bruteforce (Triggered fail2ban)
2019-09-10 07:00:22
10.218.253.187 spambotsattackproxynormal
192.168.2.1
2019-09-10 06:39:07
94.23.215.90 attack
Sep  9 21:20:37 MK-Soft-VM6 sshd\[12968\]: Invalid user git from 94.23.215.90 port 54877
Sep  9 21:20:37 MK-Soft-VM6 sshd\[12968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.215.90
Sep  9 21:20:39 MK-Soft-VM6 sshd\[12968\]: Failed password for invalid user git from 94.23.215.90 port 54877 ssh2
...
2019-09-10 06:38:02
106.51.143.178 attackbotsspam
Sep  9 20:21:23 h2177944 sshd\[30636\]: Invalid user vnc from 106.51.143.178 port 46030
Sep  9 20:21:23 h2177944 sshd\[30636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
Sep  9 20:21:25 h2177944 sshd\[30636\]: Failed password for invalid user vnc from 106.51.143.178 port 46030 ssh2
Sep  9 20:27:55 h2177944 sshd\[30892\]: Invalid user sammy from 106.51.143.178 port 52102
Sep  9 20:27:55 h2177944 sshd\[30892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.143.178
...
2019-09-10 06:57:17
103.207.11.12 attackspam
Sep  9 18:58:24 dev0-dcde-rnet sshd[11969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12
Sep  9 18:58:26 dev0-dcde-rnet sshd[11969]: Failed password for invalid user team from 103.207.11.12 port 37464 ssh2
Sep  9 19:04:40 dev0-dcde-rnet sshd[12010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12
2019-09-10 07:20:33
106.12.107.201 attack
Sep  9 23:59:16 microserver sshd[6159]: Invalid user admin from 106.12.107.201 port 41130
Sep  9 23:59:16 microserver sshd[6159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.107.201
Sep  9 23:59:19 microserver sshd[6159]: Failed password for invalid user admin from 106.12.107.201 port 41130 ssh2
Sep 10 00:05:58 microserver sshd[7428]: Invalid user tomcat from 106.12.107.201 port 45504
Sep 10 00:05:58 microserver sshd[7428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.107.201
Sep 10 00:18:45 microserver sshd[10130]: Invalid user alex from 106.12.107.201 port 54398
Sep 10 00:18:45 microserver sshd[10130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.107.201
Sep 10 00:18:47 microserver sshd[10130]: Failed password for invalid user alex from 106.12.107.201 port 54398 ssh2
Sep 10 00:25:20 microserver sshd[11326]: Invalid user support from 106.12.107.201 port 58914
2019-09-10 07:13:28
37.187.127.13 attackspambots
$f2bV_matches
2019-09-10 07:19:26
10.218.253.187 spambotsattackproxynormal
Animali
2019-09-10 06:38:54
180.148.1.218 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-10 06:48:29
128.199.210.117 attackspam
Sep  9 22:06:56 ArkNodeAT sshd\[4382\]: Invalid user teamspeak from 128.199.210.117
Sep  9 22:06:56 ArkNodeAT sshd\[4382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.117
Sep  9 22:06:58 ArkNodeAT sshd\[4382\]: Failed password for invalid user teamspeak from 128.199.210.117 port 40284 ssh2
2019-09-10 07:22:33
185.24.235.146 attack
Sep  9 18:56:40 TORMINT sshd\[25686\]: Invalid user csgoserver from 185.24.235.146
Sep  9 18:56:40 TORMINT sshd\[25686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.24.235.146
Sep  9 18:56:42 TORMINT sshd\[25686\]: Failed password for invalid user csgoserver from 185.24.235.146 port 35890 ssh2
...
2019-09-10 07:04:23
193.70.32.148 attackbots
Sep  9 07:12:42 auw2 sshd\[27794\]: Invalid user ts from 193.70.32.148
Sep  9 07:12:42 auw2 sshd\[27794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3058468.ip-193-70-32.eu
Sep  9 07:12:44 auw2 sshd\[27794\]: Failed password for invalid user ts from 193.70.32.148 port 47884 ssh2
Sep  9 07:18:24 auw2 sshd\[28260\]: Invalid user sysadmin from 193.70.32.148
Sep  9 07:18:24 auw2 sshd\[28260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3058468.ip-193-70-32.eu
2019-09-10 06:44:24
5.36.42.141 attackspambots
Sep  9 04:56:02 aiointranet sshd\[30365\]: Invalid user admin from 5.36.42.141
Sep  9 04:56:02 aiointranet sshd\[30365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.36.42.141.dynamic-dsl-ip.omantel.net.om
Sep  9 04:56:09 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2
Sep  9 04:56:11 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2
Sep  9 04:56:13 aiointranet sshd\[30365\]: Failed password for invalid user admin from 5.36.42.141 port 53225 ssh2
2019-09-10 07:20:15
188.15.110.93 attackspam
Sep 10 00:56:57 SilenceServices sshd[4600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.15.110.93
Sep 10 00:56:59 SilenceServices sshd[4600]: Failed password for invalid user ftpuser from 188.15.110.93 port 64951 ssh2
Sep 10 01:03:19 SilenceServices sshd[9783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.15.110.93
2019-09-10 07:13:10

Recently Reported IPs

103.140.158.4 103.140.180.226 103.140.181.110 103.140.181.65
103.140.8.79 103.140.9.36 56.121.179.24 103.141.131.134
103.141.131.160 103.141.131.168 103.141.131.169 103.141.131.36
103.144.132.160 103.144.132.163 103.144.132.165 103.144.132.167
103.144.132.177 103.144.132.190 103.144.132.192 103.144.132.195