Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: East District

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.136.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.136.121.		IN	A

;; AUTHORITY SECTION:
.			16	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 14:57:13 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 121.136.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.136.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.234.238.10 attack
Oct  1 12:30:29 vmd26974 sshd[4095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.234.238.10
Oct  1 12:30:31 vmd26974 sshd[4095]: Failed password for invalid user web from 201.234.238.10 port 39142 ssh2
...
2020-10-01 20:31:33
78.97.46.129 attack
Sep 30 22:41:54 mellenthin postfix/smtpd[21344]: NOQUEUE: reject: RCPT from unknown[78.97.46.129]: 554 5.7.1 Service unavailable; Client host [78.97.46.129] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/78.97.46.129 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[78.97.46.129]>
2020-10-01 20:03:10
111.125.120.235 attackbots
WordPress wp-login brute force :: 111.125.120.235 0.096 BYPASS [30/Sep/2020:20:41:48  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2577 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-10-01 20:12:16
106.13.82.231 attack
2020-10-01T15:03:51.299541afi-git.jinr.ru sshd[8008]: Failed password for admin from 106.13.82.231 port 45114 ssh2
2020-10-01T15:06:02.078118afi-git.jinr.ru sshd[8746]: Invalid user julio from 106.13.82.231 port 46298
2020-10-01T15:06:02.081445afi-git.jinr.ru sshd[8746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231
2020-10-01T15:06:02.078118afi-git.jinr.ru sshd[8746]: Invalid user julio from 106.13.82.231 port 46298
2020-10-01T15:06:03.993036afi-git.jinr.ru sshd[8746]: Failed password for invalid user julio from 106.13.82.231 port 46298 ssh2
...
2020-10-01 20:38:53
182.121.45.154 attackbots
8000/udp
[2020-09-30]1pkt
2020-10-01 20:06:37
117.223.181.82 attack
2020-09-30 19:31:38.600688-0500  localhost sshd[59474]: Failed password for invalid user user1 from 117.223.181.82 port 53460 ssh2
2020-10-01 20:04:22
61.52.168.156 attack
TCP Port Scanning
2020-10-01 20:30:27
190.79.93.209 attackspambots
Icarus honeypot on github
2020-10-01 19:59:32
216.98.211.118 attackbotsspam
445/tcp
[2020-09-30]1pkt
2020-10-01 20:21:56
180.247.21.85 attackbotsspam
1433/tcp
[2020-09-30]1pkt
2020-10-01 20:20:22
78.106.207.141 attackspam
445/tcp 445/tcp
[2020-09-30]2pkt
2020-10-01 20:14:29
200.56.17.5 attackbots
Invalid user anna from 200.56.17.5 port 43712
2020-10-01 20:16:08
134.255.57.137 attackbots
C1,WP GET /wp-login.php
2020-10-01 20:32:46
106.13.129.8 attack
Invalid user hts from 106.13.129.8 port 59826
2020-10-01 20:30:02
49.234.87.24 attackbots
Invalid user dev from 49.234.87.24 port 51378
2020-10-01 20:12:36

Recently Reported IPs

140.116.164.195 76.78.101.19 150.165.22.1 140.116.192.154
140.116.204.254 140.116.82.242 140.116.65.219 159.226.111.150
140.116.157.97 195.178.73.229 131.179.60.253 120.105.145.187
140.116.34.137 116.3.213.139 149.169.130.140 193.231.40.43
120.118.167.15 140.116.82.133 140.113.28.194 200.20.0.159