Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.22.5.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.22.5.140.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 03:58:23 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 140.5.22.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.5.22.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
120.132.31.95 attack
PostgreSQL port 5432
2019-11-02 23:54:04
14.63.194.162 attackbotsspam
Nov  2 15:48:12 h2812830 sshd[6497]: Invalid user quincy from 14.63.194.162 port 56968
Nov  2 15:48:12 h2812830 sshd[6497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162
Nov  2 15:48:12 h2812830 sshd[6497]: Invalid user quincy from 14.63.194.162 port 56968
Nov  2 15:48:13 h2812830 sshd[6497]: Failed password for invalid user quincy from 14.63.194.162 port 56968 ssh2
Nov  2 15:59:00 h2812830 sshd[6937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.194.162  user=root
Nov  2 15:59:02 h2812830 sshd[6937]: Failed password for root from 14.63.194.162 port 15180 ssh2
...
2019-11-02 23:33:27
3.215.78.15 attackspambots
xmlrpc attack
2019-11-02 23:58:33
201.48.4.15 attackspambots
Nov  2 14:11:00 vps01 sshd[16648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Nov  2 14:11:01 vps01 sshd[16648]: Failed password for invalid user erwin from 201.48.4.15 port 45772 ssh2
2019-11-02 23:48:57
185.210.144.91 attackbots
Automatic report - XMLRPC Attack
2019-11-02 23:49:21
203.190.55.203 attack
2019-11-02T15:09:55.047576abusebot-5.cloudsearch.cf sshd\[25311\]: Invalid user Qazxsw2 from 203.190.55.203 port 38950
2019-11-03 00:08:49
209.56.254.1 attackbots
*Port Scan* detected from 209.56.254.1 (US/United States/-). 4 hits in the last 280 seconds
2019-11-02 23:34:23
103.207.38.73 attackspam
Nov  2 18:54:55 lcl-usvr-02 sshd[19264]: Invalid user admin from 103.207.38.73 port 62469
...
2019-11-02 23:41:02
197.242.145.97 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-11-02 23:28:16
14.215.51.74 attack
PostgreSQL port 5432
2019-11-02 23:40:03
5.198.127.195 attackbotsspam
RDP Bruteforce
2019-11-02 23:34:01
47.96.181.63 attackbots
PostgreSQL port 5432
2019-11-02 23:35:25
221.193.177.134 attack
2019-11-02T12:27:04.846466abusebot-3.cloudsearch.cf sshd\[13484\]: Invalid user zaqwsx123! from 221.193.177.134 port 42329
2019-11-02 23:36:08
77.247.110.178 attackbotsspam
firewall-block, port(s): 55160/udp
2019-11-02 23:31:13
70.89.88.1 attack
5x Failed Password
2019-11-02 23:57:44

Recently Reported IPs

11.220.200.193 11.223.151.240 11.220.19.217 11.220.204.32
11.220.148.158 11.222.232.25 11.221.177.111 11.220.36.70
11.221.252.180 11.22.250.186 11.220.223.151 11.22.8.91
11.220.193.199 11.22.243.228 11.22.189.177 11.220.183.101
11.221.15.189 11.221.14.245 11.22.161.75 11.223.49.80