Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hsinchu

Region: Hsinchu

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.113.62.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.113.62.132.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 16:00:19 CST 2023
;; MSG SIZE  rcvd: 107
Host info
132.62.113.140.in-addr.arpa domain name pointer 140-113-62-132.Dorm5.NCTU.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.62.113.140.in-addr.arpa	name = 140-113-62-132.Dorm5.NCTU.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.231.0.88 attackbots
--- report ---
Dec  9 03:56:16 sshd: Connection from 195.231.0.88 port 57548
Dec  9 03:56:16 sshd: Received disconnect from 195.231.0.88: 11: Bye Bye [preauth]
2019-12-09 19:20:08
61.12.38.162 attackspambots
Dec  9 15:21:31 vibhu-HP-Z238-Microtower-Workstation sshd\[27106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162  user=root
Dec  9 15:21:33 vibhu-HP-Z238-Microtower-Workstation sshd\[27106\]: Failed password for root from 61.12.38.162 port 38166 ssh2
Dec  9 15:29:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: Invalid user tuoi from 61.12.38.162
Dec  9 15:29:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
Dec  9 15:29:28 vibhu-HP-Z238-Microtower-Workstation sshd\[27670\]: Failed password for invalid user tuoi from 61.12.38.162 port 46826 ssh2
...
2019-12-09 19:10:57
118.89.191.145 attackspambots
$f2bV_matches
2019-12-09 19:14:44
58.248.254.124 attack
Dec  9 12:10:38 MK-Soft-Root1 sshd[8609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124 
Dec  9 12:10:40 MK-Soft-Root1 sshd[8609]: Failed password for invalid user gaylynne from 58.248.254.124 port 47966 ssh2
...
2019-12-09 19:11:25
5.249.144.206 attackspambots
$f2bV_matches
2019-12-09 19:21:35
167.179.68.140 attackspam
Host Scan
2019-12-09 18:57:08
201.174.182.159 attack
$f2bV_matches
2019-12-09 19:14:09
157.245.98.160 attackspam
Dec  9 16:37:52 webhost01 sshd[32166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.98.160
Dec  9 16:37:54 webhost01 sshd[32166]: Failed password for invalid user syamsul from 157.245.98.160 port 33044 ssh2
...
2019-12-09 19:16:52
180.169.136.138 attackbotsspam
$f2bV_matches
2019-12-09 19:20:30
52.196.251.144 attack
$f2bV_matches
2019-12-09 19:24:44
119.29.147.247 attackbotsspam
Dec  9 11:45:30 MK-Soft-VM7 sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.147.247 
Dec  9 11:45:32 MK-Soft-VM7 sshd[2008]: Failed password for invalid user bryk from 119.29.147.247 port 42672 ssh2
...
2019-12-09 19:17:20
106.241.16.105 attack
2019-12-09T11:06:26.242099abusebot.cloudsearch.cf sshd\[768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.105  user=root
2019-12-09 19:26:10
187.34.255.251 attackspam
Dec  9 09:55:47 v22018086721571380 sshd[14086]: Failed password for invalid user vt from 187.34.255.251 port 52002 ssh2
Dec  9 10:56:35 v22018086721571380 sshd[18546]: Failed password for invalid user liidia from 187.34.255.251 port 50610 ssh2
2019-12-09 18:47:53
123.58.235.59 attack
Dec  9 12:12:53 vps647732 sshd[21136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.235.59
Dec  9 12:12:55 vps647732 sshd[21136]: Failed password for invalid user mongo12 from 123.58.235.59 port 34151 ssh2
...
2019-12-09 19:19:13
167.71.215.72 attackbotsspam
Dec  9 12:06:36 meumeu sshd[12808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72 
Dec  9 12:06:38 meumeu sshd[12808]: Failed password for invalid user bayne from 167.71.215.72 port 15614 ssh2
Dec  9 12:13:48 meumeu sshd[14108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72 
...
2019-12-09 19:15:57

Recently Reported IPs

124.17.27.171 14.102.153.210 140.116.112.4 66.96.237.182
140.116.203.93 147.8.2.30 192.235.169.212 132.170.214.13
140.116.133.163 114.79.22.47 140.117.196.40 128.189.142.153
140.116.115.174 140.116.100.66 137.204.60.39 140.116.71.76
140.116.38.181 140.116.188.198 137.189.99.131 137.189.241.46