Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: East District

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.130.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.130.172.		IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:44:50 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 172.130.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.130.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.105.216.179 attackbots
Mar 11 23:39:11 webhost01 sshd[24025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.216.179
Mar 11 23:39:13 webhost01 sshd[24025]: Failed password for invalid user support from 116.105.216.179 port 63648 ssh2
...
2020-03-12 01:09:36
216.228.209.168 attack
Automatic report - Banned IP Access
2020-03-12 01:06:59
171.237.134.255 attackspam
$f2bV_matches
2020-03-12 01:19:54
122.199.225.53 attack
Invalid user chenlu from 122.199.225.53 port 58854
2020-03-12 01:27:50
104.252.160.126 attack
SSH login attempts.
2020-03-12 01:31:29
62.171.139.59 attack
Mar 11 18:05:41 vps670341 sshd[18424]: Invalid user r00t from 62.171.139.59 port 52840
2020-03-12 01:36:08
23.196.195.59 attackspam
Scan detected 2020.03.11 11:42:05 blocked until 2020.04.05 09:13:28
2020-03-12 01:11:39
118.25.101.161 attack
SSH login attempts.
2020-03-12 01:32:43
1.77.235.89 attackspam
Scan detected 2020.03.11 11:42:05 blocked until 2020.04.05 09:13:28
2020-03-12 01:12:06
121.178.212.67 attackbots
Mar 11 18:02:04 silence02 sshd[19475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.67
Mar 11 18:02:05 silence02 sshd[19475]: Failed password for invalid user P@$$word1234 from 121.178.212.67 port 43710 ssh2
Mar 11 18:11:08 silence02 sshd[19969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.212.67
2020-03-12 01:24:21
123.58.5.36 attackbotsspam
$f2bV_matches
2020-03-12 01:04:26
142.93.220.162 attackbots
DATE:2020-03-11 16:39:10, IP:142.93.220.162, PORT:ssh SSH brute force auth (docker-dc)
2020-03-12 01:43:01
58.8.208.127 attackbotsspam
Mar 11 06:34:10 cumulus sshd[25404]: Did not receive identification string from 58.8.208.127 port 1287
Mar 11 06:34:10 cumulus sshd[25406]: Did not receive identification string from 58.8.208.127 port 1497
Mar 11 06:34:10 cumulus sshd[25407]: Did not receive identification string from 58.8.208.127 port 1500
Mar 11 06:34:10 cumulus sshd[25409]: Did not receive identification string from 58.8.208.127 port 1501
Mar 11 06:34:10 cumulus sshd[25408]: Did not receive identification string from 58.8.208.127 port 1491
Mar 11 06:34:13 cumulus sshd[25410]: Did not receive identification string from 58.8.208.127 port 1494
Mar 11 06:34:49 cumulus sshd[25460]: Did not receive identification string from 58.8.208.127 port 6043
Mar 11 06:35:26 cumulus sshd[25496]: Invalid user thostname0nich from 58.8.208.127 port 6273
Mar 11 06:35:27 cumulus sshd[25496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.8.208.127
Mar 11 06:35:27 cumulus sshd[254........
-------------------------------
2020-03-12 01:05:26
111.231.239.143 attack
Invalid user piotr from 111.231.239.143 port 36954
2020-03-12 01:35:38
202.182.120.62 attack
Mar 11 17:50:17 vmd26974 sshd[7484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.182.120.62
Mar 11 17:50:19 vmd26974 sshd[7484]: Failed password for invalid user rootme from 202.182.120.62 port 47076 ssh2
...
2020-03-12 01:00:06

Recently Reported IPs

140.115.71.47 210.73.34.57 140.116.182.47 132.234.229.108
140.116.103.85 140.117.59.184 83.212.87.17 130.75.56.90
203.68.94.1 140.130.101.1 10.3.41.15 140.116.243.126
140.123.106.13 45.153.212.24 103.47.133.130 199.20.26.143
140.123.202.67 103.18.2.235 140.116.251.3 140.116.57.91