Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.119.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.119.41.			IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:12:11 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 41.119.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.119.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.122.182.222 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/124.122.182.222/ 
 
 TH - 1H : (9)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TH 
 NAME ASN : ASN17552 
 
 IP : 124.122.182.222 
 
 CIDR : 124.122.128.0/18 
 
 PREFIX COUNT : 345 
 
 UNIQUE IP COUNT : 1515264 
 
 
 ATTACKS DETECTED ASN17552 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-03-13 13:47:45 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-13 22:54:46
188.26.231.226 attack
Automatic report - Port Scan Attack
2020-03-13 22:50:30
69.172.87.212 attackspam
Mar 13 09:45:26 firewall sshd[9692]: Failed password for root from 69.172.87.212 port 51262 ssh2
Mar 13 09:48:00 firewall sshd[9779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.172.87.212  user=root
Mar 13 09:48:01 firewall sshd[9779]: Failed password for root from 69.172.87.212 port 35931 ssh2
...
2020-03-13 22:31:14
151.80.37.18 attackbotsspam
Feb  4 13:43:20 pi sshd[19656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.37.18 
Feb  4 13:43:23 pi sshd[19656]: Failed password for invalid user roen from 151.80.37.18 port 43104 ssh2
2020-03-13 22:30:45
152.136.170.148 attackbotsspam
Jan  7 11:18:33 pi sshd[23965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.170.148 
Jan  7 11:18:35 pi sshd[23965]: Failed password for invalid user dxv from 152.136.170.148 port 46866 ssh2
2020-03-13 22:19:04
104.248.25.22 attack
Invalid user annakaplan from 104.248.25.22 port 36956
2020-03-13 22:22:25
183.134.217.238 attack
Mar 13 15:22:00 meumeu sshd[12055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.217.238 
Mar 13 15:22:02 meumeu sshd[12055]: Failed password for invalid user samba from 183.134.217.238 port 53174 ssh2
Mar 13 15:26:42 meumeu sshd[12618]: Failed password for root from 183.134.217.238 port 52814 ssh2
...
2020-03-13 22:36:10
222.186.30.167 attackspambots
Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22 [T]
2020-03-13 22:30:11
151.80.146.228 attackbotsspam
Jan 25 04:56:09 pi sshd[23299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.146.228 
Jan 25 04:56:11 pi sshd[23299]: Failed password for invalid user cron from 151.80.146.228 port 46298 ssh2
2020-03-13 22:34:30
82.209.191.216 attackbotsspam
Honeypot attack, port: 5555, PTR: 82-209-191-216.cust.bredband2.com.
2020-03-13 22:48:48
180.165.48.182 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-13 22:28:52
92.63.194.7 attack
IP blocked
2020-03-13 22:33:56
220.235.95.226 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/220.235.95.226/ 
 
 AU - 1H : (26)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN4739 
 
 IP : 220.235.95.226 
 
 CIDR : 220.235.64.0/18 
 
 PREFIX COUNT : 707 
 
 UNIQUE IP COUNT : 1283584 
 
 
 ATTACKS DETECTED ASN4739 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2020-03-13 13:48:01 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-13 22:27:48
79.36.66.32 attackspam
Honeypot attack, port: 5555, PTR: host32-66-dynamic.36-79-r.retail.telecomitalia.it.
2020-03-13 22:42:50
151.54.114.194 attack
Jan 25 19:28:42 pi sshd[31021]: Failed password for pi from 151.54.114.194 port 42662 ssh2
2020-03-13 22:39:36

Recently Reported IPs

128.32.203.134 134.241.192.17 120.105.145.170 134.68.200.24
91.237.249.174 114.79.55.94 140.116.195.62 140.116.216.130
143.160.61.149 168.172.0.254 140.138.33.183 49.149.102.51
103.22.221.56 137.82.1.1 10.3.210.94 193.170.123.235
140.116.16.168 103.76.14.189 140.116.113.3 14.139.69.25