Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chushui

Region: Changhua

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.158.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48570
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.158.52.			IN	A

;; AUTHORITY SECTION:
.			382	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 09:13:39 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 52.158.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.158.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.96.56.15 attackspam
SMTPAttack
2019-11-04 07:35:04
52.163.56.188 attackbots
2019-11-03 19:32:33,551 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 52.163.56.188
2019-11-03 21:32:00,978 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 52.163.56.188
2019-11-03 22:11:33,670 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 52.163.56.188
2019-11-03 22:50:43,673 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 52.163.56.188
2019-11-03 23:30:02,344 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 52.163.56.188
...
2019-11-04 07:28:36
14.49.137.174 attackbotsspam
firewall-block, port(s): 23/tcp
2019-11-04 07:35:56
222.186.175.182 attackbotsspam
2019-11-03T23:48:07.842024shield sshd\[9444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-11-03T23:48:09.787039shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:14.596467shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:19.391157shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-03T23:48:23.870603shield sshd\[9444\]: Failed password for root from 222.186.175.182 port 40800 ssh2
2019-11-04 07:48:57
180.249.200.210 attackbotsspam
Unauthorized connection attempt from IP address 180.249.200.210 on Port 445(SMB)
2019-11-04 07:32:32
46.38.144.57 attackspam
Nov  4 00:53:49 webserver postfix/smtpd\[30305\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 00:55:01 webserver postfix/smtpd\[30305\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 00:56:12 webserver postfix/smtpd\[30305\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 00:57:19 webserver postfix/smtpd\[30305\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 00:58:32 webserver postfix/smtpd\[30272\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-04 08:06:25
79.2.22.244 attackspam
Automatic report - Banned IP Access
2019-11-04 08:07:15
141.98.81.37 attackspambots
Nov  3 23:49:14 ns381471 sshd[7466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.37
Nov  3 23:49:16 ns381471 sshd[7466]: Failed password for invalid user admin from 141.98.81.37 port 37980 ssh2
2019-11-04 07:44:18
78.187.34.101 attack
Automatic report - Banned IP Access
2019-11-04 07:31:42
129.211.62.131 attackbotsspam
Nov  3 22:36:32 *** sshd[12370]: Invalid user td from 129.211.62.131
2019-11-04 07:51:02
115.56.187.35 attackbotsspam
Triggered: repeated knocking on closed ports.
2019-11-04 07:31:25
202.71.176.134 attackbots
Nov  3 13:40:20 php1 sshd\[1731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.176.71.202.sta.prodatanet.com.ph  user=root
Nov  3 13:40:22 php1 sshd\[1731\]: Failed password for root from 202.71.176.134 port 39314 ssh2
Nov  3 13:44:55 php1 sshd\[2275\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.176.71.202.sta.prodatanet.com.ph  user=root
Nov  3 13:44:57 php1 sshd\[2275\]: Failed password for root from 202.71.176.134 port 50112 ssh2
Nov  3 13:49:30 php1 sshd\[2775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.176.71.202.sta.prodatanet.com.ph  user=root
2019-11-04 08:07:34
200.87.7.61 attack
Nov  3 23:30:00 host sshd[46835]: Invalid user nathaniel from 200.87.7.61 port 55115
...
2019-11-04 07:34:35
222.186.173.238 attackbotsspam
Nov  4 00:28:31 minden010 sshd[15128]: Failed password for root from 222.186.173.238 port 61012 ssh2
Nov  4 00:28:35 minden010 sshd[15128]: Failed password for root from 222.186.173.238 port 61012 ssh2
Nov  4 00:28:39 minden010 sshd[15128]: Failed password for root from 222.186.173.238 port 61012 ssh2
Nov  4 00:28:43 minden010 sshd[15128]: Failed password for root from 222.186.173.238 port 61012 ssh2
...
2019-11-04 07:46:14
81.192.159.130 attackbots
Nov  3 23:46:52 work-partkepr sshd\[26344\]: Invalid user tehnolog from 81.192.159.130 port 37322
Nov  3 23:46:52 work-partkepr sshd\[26344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130
...
2019-11-04 08:00:02

Recently Reported IPs

158.195.194.175 124.16.226.205 140.116.102.186 114.142.170.31
140.116.68.82 140.116.221.109 120.114.234.130 128.186.6.103
140.116.153.134 195.199.245.169 140.116.164.179 140.116.246.215
120.114.52.219 129.2.181.236 140.116.77.75 140.117.189.188
155.95.205.98 164.8.215.113 140.116.67.104 140.116.60.74