Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.214.140.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.214.140.135.		IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:16:05 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 135.140.214.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.140.214.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.140.188.10 attackspam
 TCP (SYN) 104.140.188.10:64781 -> port 3389, len 44
2020-09-17 10:32:05
123.194.79.187 attackspam
Sep 16 18:05:07 ssh2 sshd[64979]: User root from 123-194-79-187.dynamic.kbronet.com.tw not allowed because not listed in AllowUsers
Sep 16 18:05:08 ssh2 sshd[64979]: Failed password for invalid user root from 123.194.79.187 port 34486 ssh2
Sep 16 18:05:08 ssh2 sshd[64979]: Connection closed by invalid user root 123.194.79.187 port 34486 [preauth]
...
2020-09-17 12:14:18
91.185.212.7 attackspambots
Found on   Binary Defense     / proto=6  .  srcport=57052  .  dstport=1433  .     (1088)
2020-09-17 10:30:54
138.219.201.25 attackbotsspam
2020-09-17T01:40:29.276815abusebot-8.cloudsearch.cf sshd[2370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=porta25.santana.internettelecom.com.br  user=root
2020-09-17T01:40:31.219407abusebot-8.cloudsearch.cf sshd[2370]: Failed password for root from 138.219.201.25 port 40586 ssh2
2020-09-17T01:45:16.071630abusebot-8.cloudsearch.cf sshd[2536]: Invalid user klaus from 138.219.201.25 port 52478
2020-09-17T01:45:16.078598abusebot-8.cloudsearch.cf sshd[2536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=porta25.santana.internettelecom.com.br
2020-09-17T01:45:16.071630abusebot-8.cloudsearch.cf sshd[2536]: Invalid user klaus from 138.219.201.25 port 52478
2020-09-17T01:45:17.755292abusebot-8.cloudsearch.cf sshd[2536]: Failed password for invalid user klaus from 138.219.201.25 port 52478 ssh2
2020-09-17T01:50:00.547645abusebot-8.cloudsearch.cf sshd[2592]: pam_unix(sshd:auth): authentication failure; lognam
...
2020-09-17 12:13:52
106.13.126.15 attack
Sep 17 03:45:37 vps647732 sshd[16333]: Failed password for root from 106.13.126.15 port 60510 ssh2
...
2020-09-17 12:25:54
154.160.14.38 attack
Unauthorized connection attempt from IP address 154.160.14.38 on Port 445(SMB)
2020-09-17 12:09:33
211.30.5.187 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-17 12:00:54
67.205.141.165 attackspambots
2020-09-17T00:46:58+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-17 12:08:28
185.220.102.248 attackbots
badbot
2020-09-17 12:09:07
113.252.189.174 attackbotsspam
Sep 16 14:02:16 logopedia-1vcpu-1gb-nyc1-01 sshd[353529]: Failed password for root from 113.252.189.174 port 53225 ssh2
...
2020-09-17 12:18:28
201.151.150.125 attackspam
Unauthorized connection attempt from IP address 201.151.150.125 on Port 445(SMB)
2020-09-17 12:16:06
185.222.57.80 attack
email virus
2020-09-17 12:22:38
222.186.173.183 attackbotsspam
2020-09-17T04:19:40.481857shield sshd\[1738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2020-09-17T04:19:42.609454shield sshd\[1738\]: Failed password for root from 222.186.173.183 port 41042 ssh2
2020-09-17T04:19:46.008723shield sshd\[1738\]: Failed password for root from 222.186.173.183 port 41042 ssh2
2020-09-17T04:19:49.003519shield sshd\[1738\]: Failed password for root from 222.186.173.183 port 41042 ssh2
2020-09-17T04:19:52.410859shield sshd\[1738\]: Failed password for root from 222.186.173.183 port 41042 ssh2
2020-09-17 12:25:23
103.211.20.205 attack
Unauthorized connection attempt from IP address 103.211.20.205 on Port 445(SMB)
2020-09-17 12:26:21
45.172.108.87 attackspam
Sep 16 21:21:19 * sshd[29180]: Failed password for root from 45.172.108.87 port 51764 ssh2
2020-09-17 12:15:17

Recently Reported IPs

78.87.61.158 96.126.111.89 182.45.8.76 43.154.105.51
156.227.14.148 15.185.133.190 161.35.201.110 193.202.81.13
178.158.195.183 101.0.55.187 24.189.124.225 36.235.125.141
156.212.177.71 110.250.41.218 36.69.12.38 166.249.125.36
143.202.44.205 49.69.83.82 103.161.55.164 45.61.187.112