Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.221.140.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.221.140.250.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:16:21 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 250.140.221.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.140.221.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.149.39 attackbots
Invalid user nil from 148.70.149.39 port 38534
2020-05-24 03:16:03
13.71.18.58 attack
Invalid user rto from 13.71.18.58 port 55872
2020-05-24 03:34:53
216.45.23.6 attack
5x Failed Password
2020-05-24 03:36:16
157.97.80.205 attack
Fail2Ban Ban Triggered (2)
2020-05-24 03:14:47
45.55.155.72 attack
May 23 19:47:35 inter-technics sshd[3884]: Invalid user daa from 45.55.155.72 port 24228
May 23 19:47:35 inter-technics sshd[3884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.155.72
May 23 19:47:35 inter-technics sshd[3884]: Invalid user daa from 45.55.155.72 port 24228
May 23 19:47:37 inter-technics sshd[3884]: Failed password for invalid user daa from 45.55.155.72 port 24228 ssh2
May 23 19:49:50 inter-technics sshd[3977]: Invalid user eko from 45.55.155.72 port 42814
...
2020-05-24 03:03:25
187.149.64.215 attack
May 22 21:55:04 thostnamean sshd[31508]: Invalid user ctg from 187.149.64.215 port 43209
May 22 21:55:04 thostnamean sshd[31508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.64.215 
May 22 21:55:05 thostnamean sshd[31508]: Failed password for invalid user ctg from 187.149.64.215 port 43209 ssh2
May 22 21:55:07 thostnamean sshd[31508]: Received disconnect from 187.149.64.215 port 43209:11: Bye Bye [preauth]
May 22 21:55:07 thostnamean sshd[31508]: Disconnected from invalid user ctg 187.149.64.215 port 43209 [preauth]
May 22 22:07:30 thostnamean sshd[32080]: Invalid user iol from 187.149.64.215 port 52296
May 22 22:07:30 thostnamean sshd[32080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.64.215 
May 22 22:07:32 thostnamean sshd[32080]: Failed password for invalid user iol from 187.149.64.215 port 52296 ssh2
May 22 22:07:34 thostnamean sshd[32080]: Received disconnect f........
-------------------------------
2020-05-24 03:39:30
27.254.137.144 attackbots
May 23 15:16:49 ny01 sshd[25448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144
May 23 15:16:51 ny01 sshd[25448]: Failed password for invalid user wmb from 27.254.137.144 port 43314 ssh2
May 23 15:19:26 ny01 sshd[25760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.137.144
2020-05-24 03:33:27
120.71.145.189 attack
Failed password for invalid user lnf from 120.71.145.189 port 44576 ssh2
2020-05-24 03:20:08
197.255.224.146 attackspambots
Invalid user administrator from 197.255.224.146 port 4001
2020-05-24 03:38:04
2.36.136.146 attackspambots
Repeated brute force against a port
2020-05-24 03:35:25
151.80.155.98 attackbots
Invalid user bhp from 151.80.155.98 port 50222
2020-05-24 03:15:07
139.59.66.101 attackspambots
k+ssh-bruteforce
2020-05-24 03:16:34
1.194.52.69 attack
Invalid user hst from 1.194.52.69 port 38210
2020-05-24 03:04:28
119.28.132.211 attackbots
SSH invalid-user multiple login attempts
2020-05-24 03:21:17
195.122.226.164 attackbotsspam
May 23 19:39:51 ns37 sshd[23319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.122.226.164
2020-05-24 03:38:31

Recently Reported IPs

46.101.177.73 26.37.226.159 145.170.187.200 23.215.159.66
221.44.159.119 136.11.178.78 103.249.82.118 118.125.31.25
138.71.26.23 225.169.125.100 126.207.138.242 147.138.175.88
155.224.228.110 217.74.64.236 57.131.146.246 43.204.143.43
14.193.244.191 238.194.85.14 29.240.79.128 222.122.106.224