Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.105.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.105.28.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050100 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 22:01:43 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 28.105.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.105.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.102.85.228 attack
3389BruteforceFW22
2019-07-11 01:37:58
165.22.251.129 attackspam
Jul 10 19:43:07 ArkNodeAT sshd\[22497\]: Invalid user conrad from 165.22.251.129
Jul 10 19:43:07 ArkNodeAT sshd\[22497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.129
Jul 10 19:43:08 ArkNodeAT sshd\[22497\]: Failed password for invalid user conrad from 165.22.251.129 port 53356 ssh2
2019-07-11 02:15:44
189.126.79.22 attackbots
23/tcp
[2019-07-10]1pkt
2019-07-11 02:06:43
218.92.0.207 attackspam
Jul 10 18:59:16 MK-Soft-Root2 sshd\[4257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
Jul 10 18:59:18 MK-Soft-Root2 sshd\[4257\]: Failed password for root from 218.92.0.207 port 39774 ssh2
Jul 10 18:59:20 MK-Soft-Root2 sshd\[4257\]: Failed password for root from 218.92.0.207 port 39774 ssh2
...
2019-07-11 01:47:03
81.22.45.26 attackbots
Multiport scan : 9 ports scanned 3393 3395 4000 8888 9000 9833 33891 33898 33899
2019-07-11 02:12:43
91.134.138.193 attackspam
SS1,DEF GET /wp-login.php
GET /wp-login.php
2019-07-11 02:05:19
14.185.132.239 attackbotsspam
445/tcp
[2019-07-10]1pkt
2019-07-11 01:41:52
206.189.35.65 attack
2019-07-10T17:36:17.596160abusebot-6.cloudsearch.cf sshd\[16322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cryptolend.io  user=root
2019-07-11 02:08:10
185.216.132.15 attack
Jul 10 18:36:41 core01 sshd\[19354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.216.132.15  user=root
Jul 10 18:36:42 core01 sshd\[19354\]: Failed password for root from 185.216.132.15 port 36146 ssh2
...
2019-07-11 02:10:10
178.128.112.98 attackspambots
SSH invalid-user multiple login try
2019-07-11 01:36:42
123.233.131.209 attackbots
21/tcp 21/tcp
[2019-07-10]2pkt
2019-07-11 01:49:45
14.229.4.163 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-08 23:17:04,908 INFO [shellcode_manager] (14.229.4.163) no match, writing hexdump (7b84498d6a80e973fc689ff303ea0247 :1816369) - MS17010 (EternalBlue)
2019-07-11 01:27:34
41.39.185.18 attackspambots
445/tcp 445/tcp
[2019-07-10]2pkt
2019-07-11 01:58:22
167.99.161.15 attack
Jul 10 01:40:16 Ubuntu-1404-trusty-64-minimal sshd\[18129\]: Invalid user sun from 167.99.161.15
Jul 10 01:40:16 Ubuntu-1404-trusty-64-minimal sshd\[18129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.161.15
Jul 10 01:40:17 Ubuntu-1404-trusty-64-minimal sshd\[18129\]: Failed password for invalid user sun from 167.99.161.15 port 48212 ssh2
Jul 10 19:30:14 Ubuntu-1404-trusty-64-minimal sshd\[32701\]: Invalid user dgavin from 167.99.161.15
Jul 10 19:30:14 Ubuntu-1404-trusty-64-minimal sshd\[32701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.161.15
2019-07-11 02:07:41
54.180.72.126 attackbots
Jul 10 10:35:21 *** sshd[31248]: Did not receive identification string from 54.180.72.126 port 56206
Jul 10 10:35:57 *** sshd[32421]: Did not receive identification string from 54.180.72.126 port 42310
Jul 10 10:36:01 *** sshd[32499]: Did not receive identification string from 54.180.72.126 port 48738
Jul 10 10:37:26 *** sshd[1602]: Invalid user pinapp from 54.180.72.126 port 34060
Jul 10 10:37:27 *** sshd[1600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.180.72.126  user=uucp
Jul 10 10:37:27 *** sshd[1609]: Invalid user ph from 54.180.72.126 port 33910
Jul 10 10:37:27 *** sshd[1601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.180.72.126  user=uucp
Jul 10 10:37:27 *** sshd[1606]: Invalid user pinapp from 54.180.72.126 port 43286
Jul 10 10:37:27 *** sshd[1611]: Invalid user ph from 54.180.72.126 port 34566
Jul 10 10:37:27 *** sshd[1620]: Invalid user po from 54.180.72.126 port........
-------------------------------
2019-07-11 01:41:11

Recently Reported IPs

140.115.54.233 115.178.237.249 140.126.169.250 132.206.30.245
140.116.190.29 140.116.214.210 140.116.194.21 103.10.67.170
51.38.80.133 140.116.72.190 140.116.243.157 140.116.102.45
22.204.125.22 157.27.143.186 103.78.81.187 162.121.244.35
140.116.132.151 41.89.4.36 140.116.20.56 192.58.29.10