Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.107.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.107.5.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 15:42:10 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 5.107.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.107.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.207.182.102 attackspam
Oct  1 17:25:34 f201 sshd[31383]: Connection closed by 49.207.182.102 [preauth]
Oct  1 18:48:31 f201 sshd[20259]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [49.207.182.102] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  1 18:48:31 f201 sshd[20259]: Connection closed by 49.207.182.102 [preauth]
Oct  2 04:35:16 f201 sshd[11883]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [49.207.182.102] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  2 04:35:17 f201 sshd[11883]: Connection closed by 49.207.182.102 [preauth]
Oct  2 05:33:41 f201 sshd[26495]: reveeclipse mapping checking getaddrinfo for broadband.actcorp.in [49.207.182.102] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct  2 05:33:42 f201 sshd[26495]: Connection closed by 49.207.182.102 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.207.182.102
2019-10-02 15:00:01
77.123.154.234 attackspam
Automatic report - Banned IP Access
2019-10-02 14:50:15
54.39.104.30 attackspam
Oct  1 21:04:38 tdfoods sshd\[19964\]: Invalid user sampler2 from 54.39.104.30
Oct  1 21:04:38 tdfoods sshd\[19964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns558643.ip-54-39-104.net
Oct  1 21:04:41 tdfoods sshd\[19964\]: Failed password for invalid user sampler2 from 54.39.104.30 port 41852 ssh2
Oct  1 21:08:20 tdfoods sshd\[20264\]: Invalid user jenny from 54.39.104.30
Oct  1 21:08:20 tdfoods sshd\[20264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns558643.ip-54-39-104.net
2019-10-02 15:20:00
106.12.202.192 attackspam
Oct  2 09:07:36 vps691689 sshd[28168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192
Oct  2 09:07:38 vps691689 sshd[28168]: Failed password for invalid user operator from 106.12.202.192 port 38074 ssh2
Oct  2 09:11:57 vps691689 sshd[28194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.192
...
2019-10-02 15:22:44
106.38.76.156 attack
Oct  2 06:41:06 site1 sshd\[59499\]: Invalid user aplusbiz from 106.38.76.156Oct  2 06:41:08 site1 sshd\[59499\]: Failed password for invalid user aplusbiz from 106.38.76.156 port 49966 ssh2Oct  2 06:45:51 site1 sshd\[59717\]: Invalid user adina from 106.38.76.156Oct  2 06:45:53 site1 sshd\[59717\]: Failed password for invalid user adina from 106.38.76.156 port 52825 ssh2Oct  2 06:50:47 site1 sshd\[59838\]: Invalid user tb from 106.38.76.156Oct  2 06:50:49 site1 sshd\[59838\]: Failed password for invalid user tb from 106.38.76.156 port 55678 ssh2
...
2019-10-02 15:13:02
46.38.144.32 attackspambots
Oct  2 08:34:56 relay postfix/smtpd\[13428\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 08:35:21 relay postfix/smtpd\[23988\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 08:37:23 relay postfix/smtpd\[20277\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 08:37:55 relay postfix/smtpd\[23988\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 08:39:58 relay postfix/smtpd\[13428\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-02 14:43:50
185.53.229.10 attackbots
Oct  2 08:48:12 SilenceServices sshd[1893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.53.229.10
Oct  2 08:48:13 SilenceServices sshd[1893]: Failed password for invalid user password from 185.53.229.10 port 47282 ssh2
Oct  2 08:52:09 SilenceServices sshd[3039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.53.229.10
2019-10-02 14:57:56
80.14.246.29 attackbots
email spam
2019-10-02 15:16:52
222.186.190.92 attackspambots
Oct  2 08:58:54 legacy sshd[1278]: Failed password for root from 222.186.190.92 port 39376 ssh2
Oct  2 08:59:11 legacy sshd[1278]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 39376 ssh2 [preauth]
Oct  2 08:59:21 legacy sshd[1282]: Failed password for root from 222.186.190.92 port 47768 ssh2
...
2019-10-02 15:01:55
92.119.160.52 attack
10/02/2019-02:15:22.995743 92.119.160.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-02 15:15:33
198.108.67.44 attackbotsspam
" "
2019-10-02 14:54:10
61.76.175.195 attack
Oct  2 06:45:37 www2 sshd\[30732\]: Invalid user biovitaly from 61.76.175.195Oct  2 06:45:38 www2 sshd\[30732\]: Failed password for invalid user biovitaly from 61.76.175.195 port 54860 ssh2Oct  2 06:50:36 www2 sshd\[31342\]: Invalid user cz from 61.76.175.195
...
2019-10-02 15:25:52
146.0.133.4 attackbotsspam
Oct  2 06:58:37 lnxded64 sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
Oct  2 06:58:37 lnxded64 sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
2019-10-02 14:49:12
31.129.143.73 attackbotsspam
2019-10-02T05:35:09.597386static.108.197.76.144.clients.your-server.de sshd[1831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.129.143.73  user=r.r
2019-10-02T05:35:12.171090static.108.197.76.144.clients.your-server.de sshd[1831]: Failed password for r.r from 31.129.143.73 port 47569 ssh2
2019-10-02T05:35:14.541430static.108.197.76.144.clients.your-server.de sshd[1831]: Failed password for r.r from 31.129.143.73 port 47569 ssh2
2019-10-02T05:35:17.195951static.108.197.76.144.clients.your-server.de sshd[1831]: Failed password for r.r from 31.129.143.73 port 47569 ssh2
2019-10-02T05:35:18.587318static.108.197.76.144.clients.your-server.de sshd[1831]: Failed password for r.r from 31.129.143.73 port 47569 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.129.143.73
2019-10-02 15:11:25
92.222.216.71 attackbots
Oct  2 06:54:00 MK-Soft-VM5 sshd[30326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.71 
Oct  2 06:54:02 MK-Soft-VM5 sshd[30326]: Failed password for invalid user gia from 92.222.216.71 port 55014 ssh2
...
2019-10-02 15:04:53

Recently Reported IPs

130.60.176.186 128.210.7.106 149.169.170.236 207.241.227.104
140.115.25.221 115.178.252.156 140.116.115.16 142.157.252.128
140.116.119.155 196.3.98.116 124.16.189.57 145.0.7.163
129.72.130.136 128.111.1.2 82.194.3.241 203.64.135.236
129.2.102.231 138.41.2.252 130.192.85.108 130.166.90.190