Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.66.139.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32155
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;108.66.139.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 19:35:49 CST 2025
;; MSG SIZE  rcvd: 107
Host info
140.139.66.108.in-addr.arpa domain name pointer 108-66-139-140.lightspeed.clmasc.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.139.66.108.in-addr.arpa	name = 108-66-139-140.lightspeed.clmasc.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.221.92.73 attackbots
445/tcp 445/tcp
[2019-07-09/15]2pkt
2019-07-16 07:44:41
88.201.64.185 attack
445/tcp 445/tcp 445/tcp...
[2019-05-19/07-15]9pkt,1pt.(tcp)
2019-07-16 07:27:33
200.20.115.5 attackspambots
445/tcp 445/tcp
[2019-07-03/15]2pkt
2019-07-16 08:07:05
51.38.34.110 attackbotsspam
Jul 15 04:08:25 vl01 sshd[2248]: Invalid user tao from 51.38.34.110
Jul 15 04:08:27 vl01 sshd[2248]: Failed password for invalid user tao from 51.38.34.110 port 60840 ssh2
Jul 15 04:08:27 vl01 sshd[2248]: Received disconnect from 51.38.34.110: 11: Bye Bye [preauth]
Jul 15 04:17:42 vl01 sshd[3242]: Invalid user admin1 from 51.38.34.110
Jul 15 04:17:45 vl01 sshd[3242]: Failed password for invalid user admin1 from 51.38.34.110 port 35730 ssh2
Jul 15 04:17:45 vl01 sshd[3242]: Received disconnect from 51.38.34.110: 11: Bye Bye [preauth]
Jul 15 04:22:20 vl01 sshd[3903]: Invalid user test9 from 51.38.34.110
Jul 15 04:22:22 vl01 sshd[3903]: Failed password for invalid user test9 from 51.38.34.110 port 35834 ssh2
Jul 15 04:22:22 vl01 sshd[3903]: Received disconnect from 51.38.34.110: 11: Bye Bye [preauth]
Jul 15 04:26:42 vl01 sshd[4307]: Invalid user app from 51.38.34.110
Jul 15 04:26:44 vl01 sshd[4307]: Failed password for invalid user app from 51.38.34.110 port 35934 ssh2
Jul ........
-------------------------------
2019-07-16 07:45:40
106.12.12.172 attackspam
Feb 18 03:44:16 vtv3 sshd\[2723\]: Invalid user gopher from 106.12.12.172 port 45320
Feb 18 03:44:16 vtv3 sshd\[2723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.172
Feb 18 03:44:18 vtv3 sshd\[2723\]: Failed password for invalid user gopher from 106.12.12.172 port 45320 ssh2
Feb 18 03:50:29 vtv3 sshd\[4889\]: Invalid user nagios from 106.12.12.172 port 36632
Feb 18 03:50:29 vtv3 sshd\[4889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.172
Mar  7 10:02:51 vtv3 sshd\[19017\]: Invalid user pv from 106.12.12.172 port 49762
Mar  7 10:02:51 vtv3 sshd\[19017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.172
Mar  7 10:02:52 vtv3 sshd\[19017\]: Failed password for invalid user pv from 106.12.12.172 port 49762 ssh2
Mar  7 10:10:09 vtv3 sshd\[21789\]: Invalid user fx from 106.12.12.172 port 55690
Mar  7 10:10:09 vtv3 sshd\[21789\]: pam_unix\(sshd:a
2019-07-16 07:27:58
107.171.250.254 attack
Automatic report - Port Scan Attack
2019-07-16 07:35:12
185.220.100.253 attack
Jul 15 23:49:21 server sshd[30376]: Failed password for root from 185.220.100.253 port 2598 ssh2
...
2019-07-16 08:03:37
42.112.135.184 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:18:44,903 INFO [amun_request_handler] PortScan Detected on Port: 445 (42.112.135.184)
2019-07-16 07:57:47
131.0.245.4 attack
Jul 14 07:42:33 vpxxxxxxx22308 sshd[7097]: Invalid user bert from 131.0.245.4
Jul 14 07:42:33 vpxxxxxxx22308 sshd[7097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.245.4
Jul 14 07:42:35 vpxxxxxxx22308 sshd[7097]: Failed password for invalid user bert from 131.0.245.4 port 49234 ssh2
Jul 14 07:48:53 vpxxxxxxx22308 sshd[8728]: Invalid user football from 131.0.245.4
Jul 14 07:48:53 vpxxxxxxx22308 sshd[8728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.245.4

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=131.0.245.4
2019-07-16 08:07:30
51.255.174.215 attackspambots
Jul 15 21:54:24 MK-Soft-VM3 sshd\[3538\]: Invalid user kayla from 51.255.174.215 port 50121
Jul 15 21:54:24 MK-Soft-VM3 sshd\[3538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.174.215
Jul 15 21:54:26 MK-Soft-VM3 sshd\[3538\]: Failed password for invalid user kayla from 51.255.174.215 port 50121 ssh2
...
2019-07-16 07:43:45
62.234.108.245 attack
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Invalid user misson from 62.234.108.245
Jul 16 05:15:11 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
Jul 16 05:15:13 vibhu-HP-Z238-Microtower-Workstation sshd\[18599\]: Failed password for invalid user misson from 62.234.108.245 port 58484 ssh2
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: Invalid user jin from 62.234.108.245
Jul 16 05:18:53 vibhu-HP-Z238-Microtower-Workstation sshd\[19339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.108.245
...
2019-07-16 07:56:30
153.36.236.242 attack
SSH Brute Force, server-1 sshd[21732]: Failed password for root from 153.36.236.242 port 45016 ssh2
2019-07-16 07:46:35
122.154.178.174 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-25/07-15]8pkt,1pt.(tcp)
2019-07-16 07:49:53
125.141.139.23 attackbots
Jul 15 12:49:08 TORMINT sshd\[13254\]: Invalid user chandru from 125.141.139.23
Jul 15 12:49:08 TORMINT sshd\[13254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.141.139.23
Jul 15 12:49:09 TORMINT sshd\[13254\]: Failed password for invalid user chandru from 125.141.139.23 port 55622 ssh2
...
2019-07-16 07:54:40
54.38.18.211 attackbotsspam
Jul 15 21:25:33 lnxmysql61 sshd[16972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.18.211
2019-07-16 07:43:28

Recently Reported IPs

33.51.77.117 211.221.196.156 142.201.229.164 167.50.114.116
28.150.35.111 92.162.98.255 232.3.98.112 219.36.144.50
162.116.108.53 180.145.204.143 85.208.37.116 109.250.170.21
35.126.10.30 148.48.152.133 103.232.191.228 80.31.142.165
231.205.8.169 69.241.235.100 7.144.199.0 6.37.203.196