Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: East District

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.131.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.131.238.		IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:55:35 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 238.131.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 238.131.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.204.145.108 attackbotsspam
Invalid user admin from 14.204.145.108 port 37514
2020-05-14 03:54:45
83.198.140.217 attackbotsspam
Unauthorized connection attempt from IP address 83.198.140.217 on Port 445(SMB)
2020-05-14 03:38:08
150.107.242.91 attack
Automatic report - Port Scan Attack
2020-05-14 03:29:53
198.245.53.163 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-14 03:48:56
162.243.137.150 attack
20/5/13@08:32:18: FAIL: Alarm-Telnet address from=162.243.137.150
...
2020-05-14 03:41:40
190.214.10.179 attack
2020-05-13T13:39:17.385825mail.thespaminator.com sshd[27267]: Invalid user teste from 190.214.10.179 port 60995
2020-05-13T13:39:19.601722mail.thespaminator.com sshd[27267]: Failed password for invalid user teste from 190.214.10.179 port 60995 ssh2
...
2020-05-14 04:07:51
222.186.175.169 attackspambots
May 13 19:34:43 ip-172-31-61-156 sshd[24354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
May 13 19:34:45 ip-172-31-61-156 sshd[24354]: Failed password for root from 222.186.175.169 port 20076 ssh2
...
2020-05-14 03:36:16
196.52.43.56 attackspam
Automatic report - Banned IP Access
2020-05-14 03:58:00
69.167.40.150 attack
Fraud Attack running bots
2020-05-14 03:29:43
35.200.245.55 attack
Wordpress_xmlrpc_attack
2020-05-14 03:53:00
132.145.191.90 attackbotsspam
nginx/IPasHostname/a4a6f
2020-05-14 03:31:38
54.39.50.204 attack
May 13 20:06:23 ns381471 sshd[17572]: Failed password for root from 54.39.50.204 port 17274 ssh2
May 13 20:12:07 ns381471 sshd[17988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.50.204
2020-05-14 04:00:42
137.74.44.162 attackbotsspam
Invalid user mongo from 137.74.44.162 port 45713
2020-05-14 04:03:22
200.98.139.219 attackspam
Invalid user idynamic from 200.98.139.219 port 45872
2020-05-14 03:48:39
92.87.96.104 attackbotsspam
Automatic report - Port Scan Attack
2020-05-14 03:35:12

Recently Reported IPs

140.130.17.95 140.116.249.167 140.116.52.22 81.180.208.185
140.116.201.66 193.6.53.144 130.95.176.87 147.156.28.128
140.116.123.85 140.116.78.158 140.116.39.81 120.114.240.184
140.116.130.89 207.151.52.32 140.116.16.225 140.116.244.109
140.116.1.254 35.2.198.137 146.230.98.56 192.192.114.50