Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.0.99.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.0.99.164.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 18:09:52 CST 2022
;; MSG SIZE  rcvd: 105
Host info
164.99.0.140.in-addr.arpa domain name pointer fm-dyn-140-0-99-164.fast.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.99.0.140.in-addr.arpa	name = fm-dyn-140-0-99-164.fast.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.250.179.24 attackspam
Nov  5 18:21:32 server sshd\[19649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
Nov  5 18:21:34 server sshd\[19649\]: Failed password for root from 34.250.179.24 port 38716 ssh2
Nov  5 19:03:39 server sshd\[29765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
Nov  5 19:03:41 server sshd\[29765\]: Failed password for root from 34.250.179.24 port 47096 ssh2
Nov  5 19:45:26 server sshd\[8633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-34-250-179-24.eu-west-1.compute.amazonaws.com  user=root
...
2019-11-06 01:05:28
95.57.174.214 attack
Scan microsoft-ds (TCP/445) port
2019-11-06 01:29:05
66.183.127.247 attackbotsspam
Nov  5 15:23:23 server sshd[13667]: Failed password for root from 66.183.127.247 port 54126 ssh2
Nov  5 15:34:55 server sshd[14233]: Failed password for root from 66.183.127.247 port 47988 ssh2
Nov  5 15:38:35 server sshd[14458]: Failed password for invalid user tery from 66.183.127.247 port 57690 ssh2
2019-11-06 01:10:59
117.228.211.219 attack
WEB_SERVER 403 Forbidden
2019-11-06 01:23:10
123.195.99.9 attackbotsspam
2019-11-05T18:11:24.380059scmdmz1 sshd\[31589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123-195-99-9.dynamic.kbronet.com.tw  user=root
2019-11-05T18:11:26.020694scmdmz1 sshd\[31589\]: Failed password for root from 123.195.99.9 port 50654 ssh2
2019-11-05T18:15:52.420777scmdmz1 sshd\[31929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123-195-99-9.dynamic.kbronet.com.tw  user=admin
...
2019-11-06 01:31:49
104.238.73.216 attackspam
Hit on /wp-login.php
2019-11-06 01:13:43
66.249.70.62 attack
Automatic report - Web App Attack
2019-11-06 01:16:28
52.83.105.106 attack
Nov  5 17:46:53 * sshd[32737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.83.105.106
Nov  5 17:46:55 * sshd[32737]: Failed password for invalid user Win*0 from 52.83.105.106 port 52380 ssh2
2019-11-06 01:11:47
203.195.149.55 attack
Nov  5 15:32:27 lnxmysql61 sshd[6290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.149.55
Nov  5 15:32:29 lnxmysql61 sshd[6290]: Failed password for invalid user oracle from 203.195.149.55 port 13887 ssh2
Nov  5 15:38:25 lnxmysql61 sshd[6845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.149.55
2019-11-06 01:18:20
46.38.144.202 attackspam
2019-11-05T18:35:12.113384mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T18:35:38.112891mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-05T18:36:02.397252mail01 postfix/smtpd[21416]: warning: unknown[46.38.144.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-06 01:38:21
184.13.240.142 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-06 01:07:23
70.32.23.14 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/70.32.23.14/ 
 
 SG - 1H : (39)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SG 
 NAME ASN : ASN55293 
 
 IP : 70.32.23.14 
 
 CIDR : 70.32.16.0/21 
 
 PREFIX COUNT : 74 
 
 UNIQUE IP COUNT : 72960 
 
 
 ATTACKS DETECTED ASN55293 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-05 16:42:52 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-06 01:21:19
188.165.223.93 attackspambots
$f2bV_matches
2019-11-06 01:20:53
213.61.218.122 attackspam
Nov  5 14:38:30 thevastnessof sshd[1458]: Failed password for nobody from 213.61.218.122 port 53475 ssh2
...
2019-11-06 01:13:18
221.204.11.106 attackspam
Nov  5 18:52:51 tuotantolaitos sshd[20505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.204.11.106
Nov  5 18:52:53 tuotantolaitos sshd[20505]: Failed password for invalid user 123@ASD from 221.204.11.106 port 42263 ssh2
...
2019-11-06 01:09:28

Recently Reported IPs

167.140.238.175 114.71.21.25 142.159.147.102 58.66.60.65
21.14.172.77 223.139.177.55 146.183.215.39 210.173.136.119
37.230.65.119 171.185.211.227 14.136.236.48 94.134.94.80
62.211.187.192 9.241.41.44 174.42.175.80 100.220.82.134
94.134.94.41 137.179.122.10 1.197.204.132 210.74.21.99