Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: East District

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.131.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52003
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.131.105.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050200 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 02 14:53:32 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 105.131.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.131.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.100.21.40 attack
Dec  3 19:50:18 server sshd\[31657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Dec  3 19:50:20 server sshd\[31657\]: Failed password for root from 89.100.21.40 port 48614 ssh2
Dec  3 19:58:21 server sshd\[1284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40  user=root
Dec  3 19:58:23 server sshd\[1284\]: Failed password for root from 89.100.21.40 port 51950 ssh2
Dec  3 20:04:57 server sshd\[3107\]: Invalid user xbian from 89.100.21.40
Dec  3 20:04:57 server sshd\[3107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.100.21.40 
...
2019-12-04 05:54:50
107.170.209.246 attack
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:47:19
123.206.47.228 attackbots
Fail2Ban Ban Triggered
2019-12-04 06:03:30
116.203.209.23 attackbots
2019-12-03T14:23:31.415868abusebot.cloudsearch.cf sshd\[9957\]: Invalid user opencrm from 116.203.209.23 port 46560
2019-12-04 05:58:06
121.225.70.219 attackspambots
Unauthorised access (Dec  3) SRC=121.225.70.219 LEN=40 TTL=49 ID=24203 TCP DPT=23 WINDOW=5705 SYN 
Unauthorised access (Dec  2) SRC=121.225.70.219 LEN=40 TTL=49 ID=14551 TCP DPT=23 WINDOW=45243 SYN
2019-12-04 05:52:45
157.245.66.174 attack
IPS Sensor Hit - Port Scan detected
2019-12-04 06:11:49
178.213.207.178 attackspambots
Port 1433 Scan
2019-12-04 06:07:53
65.30.40.226 attack
Exploit Attempt
2019-12-04 06:12:59
221.214.74.10 attackspambots
2019-12-03 00:04:51 server sshd[23362]: Failed password for invalid user yoyo from 221.214.74.10 port 2160 ssh2
2019-12-04 06:04:08
81.92.149.58 attack
Dec  3 22:55:27 markkoudstaal sshd[18335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.58
Dec  3 22:55:29 markkoudstaal sshd[18335]: Failed password for invalid user dubost from 81.92.149.58 port 56910 ssh2
Dec  3 23:01:14 markkoudstaal sshd[18892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.92.149.58
2019-12-04 06:11:03
118.123.11.98 attackspambots
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:46:00
115.29.32.55 attack
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:46:31
149.202.188.76 attackspam
Wordpress GET /wp-login.php attack (Automatically banned forever)
2019-12-04 05:45:24
194.15.36.177 attack
ssh failed login
2019-12-04 05:59:03
103.220.88.184 attack
Automatic report - Port Scan Attack
2019-12-04 05:50:48

Recently Reported IPs

115.178.222.149 140.116.30.171 193.227.62.217 140.116.189.54
140.116.138.99 140.116.125.5 131.175.186.17 140.116.135.131
130.158.6.82 124.16.146.188 202.67.41.223 140.116.156.196
140.116.51.234 119.78.66.3 140.116.101.174 140.120.135.64
140.116.11.9 140.116.235.46 37.248.83.244 115.59.197.212