Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: East District

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.134.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44752
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.134.114.		IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 09:30:51 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 114.134.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.134.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.212.203.113 attackspam
Jun 29 11:07:25 mail sshd[22974]: Invalid user guest from 125.212.203.113
...
2019-06-29 23:35:42
18.18.248.17 attackspambots
SSHAttack
2019-06-29 22:59:53
200.229.172.195 attack
Autoban   200.229.172.195 AUTH/CONNECT
2019-06-29 23:42:48
118.26.65.226 attack
ssh failed login
2019-06-29 23:08:33
131.0.8.49 attackspambots
Jun 29 12:20:04 dedicated sshd[3295]: Invalid user yr from 131.0.8.49 port 47830
2019-06-29 23:32:19
185.195.237.24 attackbots
SSHAttack
2019-06-29 22:57:31
47.75.125.97 attackbotsspam
DATE:2019-06-29 10:30:05, IP:47.75.125.97, PORT:ssh brute force auth on SSH service (patata)
2019-06-29 23:40:48
115.70.233.231 attack
Jun 29 12:22:55 giegler sshd[28882]: Invalid user public from 115.70.233.231 port 24196
Jun 29 12:22:55 giegler sshd[28882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.70.233.231
Jun 29 12:22:55 giegler sshd[28882]: Invalid user public from 115.70.233.231 port 24196
Jun 29 12:22:57 giegler sshd[28882]: Failed password for invalid user public from 115.70.233.231 port 24196 ssh2
2019-06-29 23:19:47
185.255.112.112 attackspambots
SSHAttack
2019-06-29 22:56:46
31.185.104.21 attackspambots
SSHAttack
2019-06-29 22:46:12
14.163.47.147 attackbots
Unauthorized connection attempt from IP address 14.163.47.147 on Port 445(SMB)
2019-06-29 22:58:53
36.66.16.219 attack
Unauthorized connection attempt from IP address 36.66.16.219 on Port 445(SMB)
2019-06-29 22:52:56
95.216.195.95 attackbots
ssh failed login
2019-06-29 23:15:34
59.44.139.132 attack
$f2bV_matches
2019-06-29 22:48:48
41.94.97.138 attackspam
Invalid user sales from 41.94.97.138 port 47762
2019-06-29 22:49:31

Recently Reported IPs

140.116.181.181 198.117.7.7 14.139.5.18 140.116.40.56
115.178.203.240 159.226.228.35 120.118.137.23 140.116.161.66
202.58.243.46 143.248.174.240 140.116.57.211 140.116.241.51
140.116.158.46 114.79.44.99 140.116.125.66 140.116.253.173
216.145.163.19 140.116.191.89 42.239.188.237 140.116.94.244