Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.177.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.177.207.		IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 15:26:32 CST 2023
;; MSG SIZE  rcvd: 108
Host info
207.177.116.140.in-addr.arpa domain name pointer realsung.ee.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.177.116.140.in-addr.arpa	name = realsung.ee.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.196.140.200 attackbotsspam
Invalid user ftpuser from 113.196.140.200 port 33334
2019-06-30 14:44:12
218.11.23.142 attackspambots
23/tcp
[2019-06-30]1pkt
2019-06-30 14:37:40
125.212.254.144 attackspam
Invalid user user from 125.212.254.144 port 57254
2019-06-30 14:34:11
196.218.26.251 attackspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-06-30 05:42:26]
2019-06-30 14:22:49
42.225.236.102 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 14:41:00
113.229.24.7 attackspam
23/tcp
[2019-06-30]1pkt
2019-06-30 14:34:53
119.29.87.183 attack
Invalid user user from 119.29.87.183 port 40512
2019-06-30 15:03:33
189.125.2.234 attack
SSH Brute-Force attacks
2019-06-30 14:28:11
37.210.207.101 attack
60001/tcp
[2019-06-30]1pkt
2019-06-30 15:18:54
180.121.188.93 attackbots
2019-06-30T04:35:48.023317 X postfix/smtpd[30506]: warning: unknown[180.121.188.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30T04:46:55.275573 X postfix/smtpd[41013]: warning: unknown[180.121.188.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30T05:42:16.375438 X postfix/smtpd[41194]: warning: unknown[180.121.188.93]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-30 15:05:30
191.53.57.28 attackbots
failed_logins
2019-06-30 14:38:07
36.233.94.149 attack
37215/tcp
[2019-06-30]1pkt
2019-06-30 15:15:17
191.53.221.114 attackbots
Lines containing failures of 191.53.221.114
2019-06-30 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.53.221.114
2019-06-30 15:06:47
188.165.242.200 attackspam
Invalid user odoo from 188.165.242.200 port 43624
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200
Failed password for invalid user odoo from 188.165.242.200 port 43624 ssh2
Invalid user ulrich from 188.165.242.200 port 48290
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.242.200
2019-06-30 14:30:56
104.238.116.94 attackspambots
Jun 30 08:50:13 pornomens sshd\[31065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.238.116.94  user=root
Jun 30 08:50:15 pornomens sshd\[31065\]: Failed password for root from 104.238.116.94 port 43538 ssh2
Jun 30 08:56:53 pornomens sshd\[31146\]: Invalid user oracle from 104.238.116.94 port 37562
...
2019-06-30 15:09:32

Recently Reported IPs

141.99.145.63 134.100.102.239 192.167.185.254 152.40.4.178
128.30.52.95 120.118.161.97 193.147.36.132 120.107.42.156
114.79.44.22 194.27.38.233 140.116.115.124 140.116.221.8
1.55.245.53 175.34.247.253 200.12.169.200 10.201.15.135
140.116.237.195 158.144.67.9 150.165.159.63 140.116.56.124