Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.162.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.162.131.		IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062802 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 29 09:00:16 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 131.162.116.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 131.162.116.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
31.167.133.137 attackspambots
$f2bV_matches
2020-04-20 20:59:03
41.207.81.182 attack
Invalid user je from 41.207.81.182 port 45766
2020-04-20 20:55:33
89.134.126.89 attack
Apr 20 08:18:38 mail sshd\[21173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.126.89  user=root
...
2020-04-20 20:47:15
43.226.153.34 attackspambots
Invalid user admin from 43.226.153.34 port 35470
2020-04-20 20:55:18
111.177.16.4 attackbotsspam
Invalid user ubuntu from 111.177.16.4 port 47452
2020-04-20 20:37:43
81.4.106.155 attack
Invalid user test05 from 81.4.106.155 port 35340
2020-04-20 20:47:29
189.190.39.56 attackspam
Invalid user su from 189.190.39.56 port 38938
2020-04-20 21:16:18
217.182.68.93 attack
Apr 20 17:34:54 gw1 sshd[32681]: Failed password for root from 217.182.68.93 port 54168 ssh2
...
2020-04-20 21:07:53
219.250.188.142 attackbots
Invalid user uz from 219.250.188.142 port 49575
2020-04-20 21:07:10
34.92.237.74 attack
Invalid user wa from 34.92.237.74 port 44656
2020-04-20 20:58:27
61.19.86.219 attackspam
Invalid user testftp from 61.19.86.219 port 40014
2020-04-20 20:50:57
213.251.41.225 attackspambots
Bruteforce detected by fail2ban
2020-04-20 21:08:08
95.85.12.122 attackbotsspam
Invalid user lr from 95.85.12.122 port 17720
2020-04-20 20:43:43
185.84.138.139 attackspam
Invalid user teste from 185.84.138.139 port 53256
2020-04-20 21:17:44
201.90.101.165 attackbotsspam
Invalid user test from 201.90.101.165 port 38778
2020-04-20 21:11:51

Recently Reported IPs

158.129.200.19 83.212.114.90 140.116.36.125 140.78.3.62
14.139.61.2 140.113.160.52 140.116.164.175 13.52.98.126
203.133.248.6 202.120.16.72 159.93.167.39 120.96.230.72
140.116.118.125 138.23.247.131 134.208.101.180 140.123.42.105
147.46.20.67 140.116.187.208 140.116.161.110 140.116.83.252