Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.12.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10841
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.12.29.			IN	A

;; AUTHORITY SECTION:
.			165	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 18:09:02 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 29.12.116.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 29.12.116.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.166.150.17 attack
Invalid user pdj from 188.166.150.17 port 33123
2020-04-05 19:19:33
223.71.73.247 attack
Apr  5 05:49:54 h2829583 sshd[10083]: Failed password for root from 223.71.73.247 port 22005 ssh2
2020-04-05 18:59:59
106.13.78.198 attackbotsspam
2020-04-05T10:56:17.601126homeassistant sshd[25400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.198  user=root
2020-04-05T10:56:19.799469homeassistant sshd[25400]: Failed password for root from 106.13.78.198 port 52104 ssh2
...
2020-04-05 19:06:01
117.50.62.33 attackbots
leo_www
2020-04-05 19:15:43
139.208.201.189 attack
firewall-block, port(s): 23/tcp
2020-04-05 18:39:55
198.55.50.196 attack
Apr  5 10:06:17 baguette sshd\[30909\]: Invalid user qhsupport from 198.55.50.196 port 37626
Apr  5 10:06:17 baguette sshd\[30909\]: Invalid user qhsupport from 198.55.50.196 port 37626
Apr  5 10:08:03 baguette sshd\[30913\]: Invalid user michael from 198.55.50.196 port 57626
Apr  5 10:08:03 baguette sshd\[30913\]: Invalid user michael from 198.55.50.196 port 57626
Apr  5 10:09:51 baguette sshd\[30966\]: Invalid user postgres from 198.55.50.196 port 49394
Apr  5 10:09:51 baguette sshd\[30966\]: Invalid user postgres from 198.55.50.196 port 49394
...
2020-04-05 19:21:04
3.136.236.138 attack
Hammered by port scans by Amazon servers IP addresses from all around the world
2020-04-05 19:03:34
103.114.107.129 attackspam
Port 3389 (MS RDP) access denied
2020-04-05 19:16:32
114.67.75.142 attackbots
Apr  5 09:07:05 jane sshd[17588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.75.142 
Apr  5 09:07:08 jane sshd[17588]: Failed password for invalid user server$2008 from 114.67.75.142 port 49252 ssh2
...
2020-04-05 19:03:20
46.38.145.144 attackbots
Apr  5 05:49:26 andromeda postfix/smtpd\[28858\]: warning: unknown\[46.38.145.144\]: SASL LOGIN authentication failed: authentication failure
Apr  5 05:49:26 andromeda postfix/smtpd\[28858\]: warning: unknown\[46.38.145.144\]: SASL LOGIN authentication failed: authentication failure
Apr  5 05:49:26 andromeda postfix/smtpd\[28858\]: warning: unknown\[46.38.145.144\]: SASL LOGIN authentication failed: authentication failure
Apr  5 05:49:27 andromeda postfix/smtpd\[28858\]: warning: unknown\[46.38.145.144\]: SASL LOGIN authentication failed: authentication failure
Apr  5 05:49:27 andromeda postfix/smtpd\[28858\]: warning: unknown\[46.38.145.144\]: SASL LOGIN authentication failed: authentication failure
2020-04-05 19:17:23
80.253.50.125 attackbotsspam
Attempted Brute Force (dovecot)
2020-04-05 19:01:17
103.200.22.126 attackbotsspam
Invalid user bpe from 103.200.22.126 port 39692
2020-04-05 19:12:39
186.139.218.8 attackspambots
SSH brute force attempt
2020-04-05 18:44:17
167.71.9.180 attackbotsspam
web-1 [ssh] SSH Attack
2020-04-05 18:39:35
185.15.244.217 attackbotsspam
$f2bV_matches
2020-04-05 19:23:34

Recently Reported IPs

140.96.128.144 193.219.28.147 140.116.217.245 10.3.73.40
129.11.159.114 140.116.71.81 212.235.175.5 197.50.169.41
140.127.74.11 120.114.241.177 140.116.86.16 210.76.214.181
140.116.48.139 140.116.75.30 130.88.240.66 140.116.156.240
85.122.18.184 209.129.30.14 140.115.17.213 143.225.172.218