Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.105.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.105.98.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 17:16:47 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 98.105.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 98.105.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.254.229.202 attack
Scanning for admin resources and attempting to identify software used
2020-05-28 18:28:27
51.75.123.107 attack
May 28 12:36:44 melroy-server sshd[13629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.123.107 
May 28 12:36:45 melroy-server sshd[13629]: Failed password for invalid user shell from 51.75.123.107 port 58326 ssh2
...
2020-05-28 18:59:42
94.100.180.160 attackbotsspam
SSH login attempts.
2020-05-28 18:33:26
198.108.66.217 attackspambots
Unauthorized connection attempt detected from IP address 198.108.66.217 to port 2095
2020-05-28 18:38:38
167.99.234.170 attackbotsspam
Brute-force attempt banned
2020-05-28 18:32:59
142.93.114.213 attackbotsspam
Invalid user nisigawa from 142.93.114.213 port 49908
2020-05-28 18:39:42
188.166.150.17 attackspam
Invalid user admin from 188.166.150.17 port 44789
2020-05-28 18:35:14
61.134.23.205 attackbotsspam
CN_MAINT-CHINANET_<177>1590637957 [1:2010935:3] ET SCAN Suspicious inbound to MSSQL port 1433 [Classification: Potentially Bad Traffic] [Priority: 2]:  {TCP} 61.134.23.205:44575
2020-05-28 18:37:29
35.226.132.241 attackbotsspam
Invalid user ubnt from 35.226.132.241 port 55006
2020-05-28 18:46:21
187.188.236.198 attackbotsspam
Invalid user git from 187.188.236.198 port 38704
2020-05-28 18:41:27
137.118.46.160 attackspambots
SSH login attempts.
2020-05-28 18:40:01
139.255.86.19 attackbotsspam
May 28 05:52:45 debian-2gb-nbg1-2 kernel: \[12896757.143160\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=139.255.86.19 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=62518 PROTO=TCP SPT=56917 DPT=1433 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-28 18:29:58
204.191.245.129 attackspambots
SSH login attempts.
2020-05-28 19:05:20
194.78.176.102 attackspambots
SSH login attempts.
2020-05-28 18:58:06
195.54.160.212 attackspambots
May 28 12:49:49 debian-2gb-nbg1-2 kernel: \[12921779.108986\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.160.212 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=49489 PROTO=TCP SPT=43189 DPT=51301 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-28 19:05:58

Recently Reported IPs

140.116.130.58 66.96.236.246 202.90.158.21 140.116.247.180
140.116.195.145 115.178.250.147 140.116.34.199 140.116.70.25
140.116.109.114 140.116.243.89 140.116.130.55 140.116.206.171
152.61.133.67 140.116.194.75 128.227.135.87 192.114.2.15
196.43.147.197 140.116.161.91 140.116.205.2 177.129.190.10