Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.110.253.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.110.253.172.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 07:36:12 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 172.253.110.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.253.110.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.240.219.146 attackbotsspam
port scan and connect, tcp 1026 (LSA-or-nterm)
2019-10-30 23:16:26
188.18.53.48 attackbotsspam
Sniffing for wp-login
2019-10-30 23:09:59
85.144.226.170 attackbotsspam
2019-10-30 01:21:02 server sshd[46897]: Failed password for invalid user user3 from 85.144.226.170 port 32776 ssh2
2019-10-30 23:29:23
106.54.112.173 attackspambots
2019-10-30T15:29:19.542212shield sshd\[12899\]: Invalid user sd from 106.54.112.173 port 45484
2019-10-30T15:29:19.548142shield sshd\[12899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.112.173
2019-10-30T15:29:21.037589shield sshd\[12899\]: Failed password for invalid user sd from 106.54.112.173 port 45484 ssh2
2019-10-30T15:35:04.358959shield sshd\[13665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.112.173  user=root
2019-10-30T15:35:06.877193shield sshd\[13665\]: Failed password for root from 106.54.112.173 port 55290 ssh2
2019-10-30 23:43:10
66.70.247.212 attackspam
Oct 30 16:46:24 odie postfix/smtpd\[30129\]: warning: ip212.ip-66-70-247.net\[66.70.247.212\]: SASL LOGIN authentication failed: authentication failure
Oct 30 16:50:50 odie postfix/smtpd\[30368\]: warning: ip212.ip-66-70-247.net\[66.70.247.212\]: SASL LOGIN authentication failed: authentication failure
Oct 30 16:55:28 odie postfix/smtpd\[30573\]: warning: ip212.ip-66-70-247.net\[66.70.247.212\]: SASL LOGIN authentication failed: authentication failure
Oct 30 16:59:43 odie postfix/smtpd\[30739\]: warning: ip212.ip-66-70-247.net\[66.70.247.212\]: SASL LOGIN authentication failed: authentication failure
Oct 30 17:04:10 odie postfix/smtpd\[31055\]: warning: ip212.ip-66-70-247.net\[66.70.247.212\]: SASL LOGIN authentication failed: authentication failure
2019-10-30 23:13:03
81.22.45.116 attack
10/30/2019-16:45:13.266209 81.22.45.116 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-30 23:45:25
88.147.0.163 attack
Automatic report - Port Scan Attack
2019-10-30 23:14:40
81.171.85.138 attack
\[2019-10-30 11:41:44\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:62371' - Wrong password
\[2019-10-30 11:41:44\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-30T11:41:44.426-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1244",SessionID="0x7fdf2cc7a718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85.138/62371",Challenge="31aee359",ReceivedChallenge="31aee359",ReceivedHash="02ded38e08d6bf4e3acfcd972282e3d5"
\[2019-10-30 11:42:36\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '81.171.85.138:55956' - Wrong password
\[2019-10-30 11:42:36\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-30T11:42:36.375-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1187",SessionID="0x7fdf2cc7a718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.85
2019-10-30 23:49:45
180.71.47.198 attackbotsspam
Invalid user adcuser from 180.71.47.198 port 54706
2019-10-30 23:22:23
177.189.176.107 attack
23/tcp
[2019-10-30]1pkt
2019-10-30 23:28:08
51.68.125.206 attack
Oct 30 16:00:00 ns381471 sshd[16519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.125.206
Oct 30 16:00:02 ns381471 sshd[16519]: Failed password for invalid user omi from 51.68.125.206 port 34784 ssh2
2019-10-30 23:17:40
180.114.213.145 attackbotsspam
Oct 30 07:44:52 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:44:55 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:44:58 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:45:03 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]
Oct 30 07:45:05 esmtp postfix/smtpd[2736]: lost connection after AUTH from unknown[180.114.213.145]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.114.213.145
2019-10-30 23:32:14
159.65.4.86 attackspambots
Invalid user airbamboo from 159.65.4.86 port 53938
2019-10-30 23:23:23
112.104.58.108 attackspambots
" "
2019-10-30 23:30:16
107.189.11.150 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-30 23:05:50

Recently Reported IPs

246.208.7.160 9.231.224.79 226.47.29.168 75.60.44.145
57.154.130.30 125.231.79.62 133.134.214.164 249.223.189.8
24.198.50.145 81.90.161.8 143.227.144.1 103.223.137.224
239.233.160.104 186.198.247.154 6.11.213.113 24.223.247.146
77.97.71.80 2.203.209.172 6.222.217.60 240.240.188.35