Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.112.48.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.112.48.206.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 02:54:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
206.48.112.140.in-addr.arpa domain name pointer xdn48o206.ee.ntu.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
206.48.112.140.in-addr.arpa	name = xdn48o206.ee.ntu.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.12.49.162 attack
SSH Brute Force
2020-03-20 21:55:49
82.81.211.248 attack
SSH Brute Force
2020-03-20 21:48:08
198.108.66.181 attack
9200/tcp 1521/tcp 3306/tcp...
[2020-01-23/03-20]10pkt,10pt.(tcp)
2020-03-20 21:58:05
14.143.171.118 attackbots
SSH Brute Force
2020-03-20 21:53:04
111.231.94.138 attack
SSH Brute Force
2020-03-20 21:40:53
185.175.93.3 attackbotsspam
03/20/2020-09:13:05.236128 185.175.93.3 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-20 21:29:01
92.63.194.32 attackbotsspam
Mar 20 13:17:22 *** sshd[13566]: User root from 92.63.194.32 not allowed because not listed in AllowUsers
2020-03-20 21:45:38
156.222.222.180 attack
firewall-block, port(s): 23/tcp
2020-03-20 21:30:53
68.183.183.21 attackspam
SSH Brute Force
2020-03-20 21:48:30
13.75.232.117 attackbotsspam
Unauthorized connection attempt detected from IP address 13.75.232.117 to port 22 [T]
2020-03-20 21:53:54
125.254.54.102 attackspambots
SSH Brute Force
2020-03-20 21:39:06
92.222.36.74 attack
SSH Brute Force
2020-03-20 21:44:15
183.87.76.57 attackbots
Port 22 Scan, PTR: None
2020-03-20 21:29:49
167.114.55.91 attackbots
SSH Brute Force
2020-03-20 22:02:40
45.152.182.136 attackspam
Ignored robots.txt
2020-03-20 21:28:26

Recently Reported IPs

236.106.167.135 246.225.192.151 167.6.251.183 34.43.19.50
204.116.157.88 29.109.246.247 194.87.163.90 49.192.158.84
38.165.167.101 91.17.22.120 103.34.248.23 164.1.148.89
148.129.10.176 68.147.186.191 72.81.113.167 80.131.79.174
71.228.62.197 40.61.237.108 166.143.233.60 203.247.46.5