Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tucson

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.196.140.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;128.196.140.105.		IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061901 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 20 07:52:16 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 105.140.196.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.140.196.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.65.77.171 attackspam
Invalid user windows from 159.65.77.171 port 38380
2020-06-06 02:10:33
117.6.40.37 attackspambots
Invalid user admin from 117.6.40.37 port 51104
2020-06-06 01:37:02
14.169.224.192 attack
Invalid user admin from 14.169.224.192 port 55812
2020-06-06 01:55:50
202.175.46.170 attack
$f2bV_matches
2020-06-06 02:01:23
113.218.134.19 attackspam
Invalid user pi from 113.218.134.19 port 46290
2020-06-06 01:38:41
123.232.124.106 attackbots
Invalid user pi from 123.232.124.106 port 40666
2020-06-06 01:32:32
51.77.211.94 attackbotsspam
Jun  6 03:12:51 localhost sshd[302547]: Connection closed by 51.77.211.94 port 44762 [preauth]
...
2020-06-06 01:48:28
112.78.132.12 attackbots
Invalid user admin from 112.78.132.12 port 46068
2020-06-06 01:40:08
218.56.11.236 attackbotsspam
Invalid user mmuthuri from 218.56.11.236 port 34271
2020-06-06 01:58:45
121.138.83.92 attack
Unauthorized connection attempt detected from IP address 121.138.83.92 to port 22
2020-06-06 01:35:24
209.141.40.12 attackspambots
2020-06-05T17:52:48.542291shield sshd\[21712\]: Invalid user oracle from 209.141.40.12 port 47632
2020-06-05T17:52:48.545694shield sshd\[21711\]: Invalid user ubuntu from 209.141.40.12 port 47628
2020-06-05T17:52:48.546395shield sshd\[21707\]: Invalid user ec2-user from 209.141.40.12 port 47626
2020-06-05T17:52:48.547068shield sshd\[21713\]: Invalid user postgres from 209.141.40.12 port 47642
2020-06-05T17:52:48.549269shield sshd\[21709\]: Invalid user user from 209.141.40.12 port 47638
2020-06-06 02:00:41
179.56.251.41 attackbots
Invalid user cablecom from 179.56.251.41 port 41340
2020-06-06 02:08:35
116.231.74.244 attackspambots
Invalid user 22 from 116.231.74.244 port 44772
2020-06-06 01:37:18
111.231.215.55 attackbots
Invalid user byu from 111.231.215.55 port 33758
2020-06-06 01:41:03
106.12.13.247 attack
Invalid user 22 from 106.12.13.247 port 58728
2020-06-06 01:42:56

Recently Reported IPs

213.159.29.214 85.41.154.19 180.4.92.105 101.174.255.226
115.136.243.19 218.98.12.215 213.41.135.119 176.27.215.56
171.105.240.167 149.71.169.142 182.87.212.178 201.24.225.174
124.109.189.149 202.94.35.150 156.203.206.51 173.138.170.136
193.184.137.27 219.156.143.167 95.13.129.167 45.26.129.103