Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.242.8.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.242.8.140.			IN	A

;; AUTHORITY SECTION:
.			402	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 13:47:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 140.8.242.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.8.242.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.68.107.130 attack
 TCP (SYN) 111.68.107.130:56667 -> port 445, len 52
2020-05-20 06:31:30
150.158.111.251 attackbotsspam
Bruteforce detected by fail2ban
2020-05-20 06:34:20
119.82.242.153 attackbotsspam
 TCP (SYN) 119.82.242.153:53910 -> port 23, len 40
2020-05-20 06:59:59
37.183.175.234 attackbotsspam
 TCP (SYN) 37.183.175.234:5842 -> port 81, len 44
2020-05-20 07:01:57
125.227.185.110 attack
 TCP (SYN) 125.227.185.110:15773 -> port 81, len 40
2020-05-20 06:32:57
36.237.109.90 attack
 TCP (SYN) 36.237.109.90:27307 -> port 23, len 40
2020-05-20 06:52:41
162.243.137.172 attackbots
firewall-block, port(s): 137/udp
2020-05-20 06:30:33
213.109.235.169 attack
 TCP (SYN) 213.109.235.169:39986 -> port 23, len 40
2020-05-20 06:49:43
1.34.166.215 attack
port 23
2020-05-20 07:02:22
82.115.78.58 attackspambots
 TCP (SYN) 82.115.78.58:5846 -> port 81, len 40
2020-05-20 06:37:02
220.134.204.122 attack
 TCP (SYN) 220.134.204.122:29186 -> port 8080, len 40
2020-05-20 06:58:57
188.252.13.138 attackspam
 TCP (SYN) 188.252.13.138:53173 -> port 25, len 60
2020-05-20 07:06:24
74.82.47.17 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-20 06:35:11
103.81.114.134 attackspambots
 TCP (SYN) 103.81.114.134:56814 -> port 445, len 52
2020-05-20 06:46:22
220.133.64.21 attackbotsspam
 TCP (SYN) 220.133.64.21:36703 -> port 23, len 40
2020-05-20 06:33:24

Recently Reported IPs

113.212.70.246 113.242.153.159 113.242.200.191 113.242.231.135
113.242.195.120 113.212.70.247 113.242.151.159 113.243.157.188
113.242.148.219 113.242.8.130 113.242.245.41 113.242.192.19
113.242.176.188 113.243.255.148 113.243.33.194 113.244.136.38
113.243.32.218 113.212.70.248 113.244.139.193 113.244.160.93