Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.116.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.116.253.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 15:26:21 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 253.116.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 253.116.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.98.40.137 attackbots
09/03/2019-23:51:25.179090 218.98.40.137 Protocol: 6 ET SCAN Potential SSH Scan
2019-09-04 12:02:02
185.176.27.42 attackspambots
09/04/2019-00:02:54.454845 185.176.27.42 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-04 12:22:58
158.69.193.32 attackspambots
2019-09-04T03:29:28.987999abusebot-4.cloudsearch.cf sshd\[11850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-158-69-193.net  user=root
2019-09-04 11:58:10
58.140.91.76 attack
Sep  4 04:17:15 web8 sshd\[30673\]: Invalid user tip from 58.140.91.76
Sep  4 04:17:15 web8 sshd\[30673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.140.91.76
Sep  4 04:17:18 web8 sshd\[30673\]: Failed password for invalid user tip from 58.140.91.76 port 28237 ssh2
Sep  4 04:21:50 web8 sshd\[510\]: Invalid user bianca from 58.140.91.76
Sep  4 04:21:50 web8 sshd\[510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.140.91.76
2019-09-04 12:29:19
106.12.16.179 attackspam
Sep  4 06:48:52 taivassalofi sshd[164603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.179
Sep  4 06:48:54 taivassalofi sshd[164603]: Failed password for invalid user agustin from 106.12.16.179 port 56562 ssh2
...
2019-09-04 11:57:35
195.189.9.3 attackbots
35erYFt978XjZ8VCEvK6sobLAH46ZcyFAQ
2019-09-04 12:20:06
187.111.23.14 attack
Sep  4 05:28:49 host sshd\[26985\]: Invalid user anne from 187.111.23.14 port 55768
Sep  4 05:28:51 host sshd\[26985\]: Failed password for invalid user anne from 187.111.23.14 port 55768 ssh2
...
2019-09-04 12:32:25
120.52.152.18 attack
Sep  3 11:34:36 localhost kernel: [1262692.734626] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=120.52.152.18 DST=[mungedIP2] LEN=28 TOS=0x00 PREC=0x00 TTL=240 ID=36350 PROTO=UDP SPT=58914 DPT=20000 LEN=8 
Sep  3 23:29:18 localhost kernel: [1305574.265492] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=120.52.152.18 DST=[mungedIP2] LEN=28 TOS=0x00 PREC=0x00 TTL=240 ID=1124 PROTO=UDP SPT=58914 DPT=2424 LEN=8 
Sep  3 23:29:18 localhost kernel: [1305574.265519] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=120.52.152.18 DST=[mungedIP2] LEN=28 TOS=0x00 PREC=0x00 TTL=240 ID=1124 PROTO=UDP SPT=58914 DPT=2424 LEN=8
2019-09-04 12:12:00
134.73.76.200 attackspam
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-09-04 12:35:09
185.85.239.110 attack
Attempted WordPress login: "GET /wp-login.php"
2019-09-04 12:16:56
206.189.119.73 attack
Sep  4 06:12:57 legacy sshd[8195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73
Sep  4 06:12:59 legacy sshd[8195]: Failed password for invalid user minecraft from 206.189.119.73 port 41378 ssh2
Sep  4 06:16:57 legacy sshd[8255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73
...
2019-09-04 12:28:11
23.129.64.159 attackbots
2019-09-04T04:29:40.352924abusebot-2.cloudsearch.cf sshd\[9853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.emeraldonion.org  user=root
2019-09-04 12:30:17
101.255.117.203 attackspambots
Caught in portsentry honeypot
2019-09-04 11:55:29
89.248.168.202 attackspambots
09/03/2019-23:29:23.657640 89.248.168.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-04 11:58:35
193.112.23.81 attackbotsspam
Sep  4 06:13:42 localhost sshd\[17625\]: Invalid user dalia from 193.112.23.81 port 43923
Sep  4 06:13:42 localhost sshd\[17625\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.23.81
Sep  4 06:13:44 localhost sshd\[17625\]: Failed password for invalid user dalia from 193.112.23.81 port 43923 ssh2
2019-09-04 12:30:51

Recently Reported IPs

140.116.92.16 115.178.203.92 140.125.205.225 140.113.89.130
140.116.20.84 140.116.72.58 114.79.55.0 140.116.165.20
140.125.240.213 152.66.207.33 140.116.52.69 140.116.191.91
115.178.221.77 202.127.2.111 140.117.185.206 140.116.160.253
120.113.184.31 116.213.97.98 120.114.241.68 140.116.133.211