Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.113.226.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.113.226.70.			IN	A

;; AUTHORITY SECTION:
.			310	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:17:14 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 70.226.113.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.226.113.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.48.18.129 attackspambots
Apr 26 09:03:51 ws19vmsma01 sshd[35131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.18.129
Apr 26 09:03:53 ws19vmsma01 sshd[35131]: Failed password for invalid user test from 181.48.18.129 port 35214 ssh2
...
2020-04-26 20:27:01
35.199.45.117 attackspam
Apr 26 14:03:08 MainVPS sshd[15758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.45.117  user=root
Apr 26 14:03:10 MainVPS sshd[15758]: Failed password for root from 35.199.45.117 port 53126 ssh2
Apr 26 14:03:47 MainVPS sshd[16414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.45.117  user=root
Apr 26 14:03:49 MainVPS sshd[16414]: Failed password for root from 35.199.45.117 port 54538 ssh2
Apr 26 14:04:25 MainVPS sshd[16887]: Invalid user test from 35.199.45.117 port 55828
...
2020-04-26 20:10:41
103.136.40.31 attack
Apr 26 09:09:14 vps46666688 sshd[16311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.136.40.31
Apr 26 09:09:16 vps46666688 sshd[16311]: Failed password for invalid user postgres from 103.136.40.31 port 55568 ssh2
...
2020-04-26 20:13:04
5.39.223.55 attackspambots
spam
2020-04-26 20:06:34
161.35.11.254 attackspam
2020-04-26T11:59:56.763978abusebot-3.cloudsearch.cf sshd[10811]: Invalid user b from 161.35.11.254 port 60132
2020-04-26T11:59:56.769350abusebot-3.cloudsearch.cf sshd[10811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.254
2020-04-26T11:59:56.763978abusebot-3.cloudsearch.cf sshd[10811]: Invalid user b from 161.35.11.254 port 60132
2020-04-26T11:59:58.100840abusebot-3.cloudsearch.cf sshd[10811]: Failed password for invalid user b from 161.35.11.254 port 60132 ssh2
2020-04-26T12:02:48.211023abusebot-3.cloudsearch.cf sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.11.254  user=root
2020-04-26T12:02:49.817345abusebot-3.cloudsearch.cf sshd[10966]: Failed password for root from 161.35.11.254 port 46572 ssh2
2020-04-26T12:04:07.662680abusebot-3.cloudsearch.cf sshd[11079]: Invalid user csv from 161.35.11.254 port 41194
...
2020-04-26 20:23:46
1.22.124.94 attackbotsspam
sshd login attampt
2020-04-26 20:45:24
103.130.192.135 attackbotsspam
sshd login attampt
2020-04-26 20:14:46
101.50.2.29 attackbotsspam
sshd login attampt
2020-04-26 20:28:26
103.129.223.22 attack
sshd login attampt
2020-04-26 20:17:50
1.6.182.218 attackbots
sshd login attampt
2020-04-26 20:42:14
138.68.93.14 attackbotsspam
k+ssh-bruteforce
2020-04-26 20:02:15
103.126.172.6 attackspam
sshd login attampt
2020-04-26 20:18:49
27.254.130.67 attack
Apr 26 13:54:13 prod4 sshd\[6867\]: Failed password for root from 27.254.130.67 port 47026 ssh2
Apr 26 13:59:20 prod4 sshd\[8413\]: Failed password for root from 27.254.130.67 port 45390 ssh2
Apr 26 14:04:02 prod4 sshd\[10461\]: Invalid user tanya from 27.254.130.67
...
2020-04-26 20:32:02
104.236.142.89 attack
Apr 26 08:15:30 NPSTNNYC01T sshd[15927]: Failed password for root from 104.236.142.89 port 57830 ssh2
Apr 26 08:19:38 NPSTNNYC01T sshd[16393]: Failed password for root from 104.236.142.89 port 41506 ssh2
Apr 26 08:23:32 NPSTNNYC01T sshd[16934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.89
...
2020-04-26 20:25:22
103.18.248.31 attack
sshd login attampt
2020-04-26 20:10:16

Recently Reported IPs

142.103.117.139 149.164.111.96 140.116.235.151 140.116.191.164
202.67.45.41 140.116.253.36 140.116.106.140 140.116.221.253
120.110.15.81 140.116.59.15 140.134.25.126 158.110.144.177
140.125.96.131 207.241.233.138 140.116.132.64 202.52.13.98
103.255.171.24 140.116.49.54 150.109.198.4 140.116.181.84