Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.187.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.187.42.			IN	A

;; AUTHORITY SECTION:
.			179	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 10:19:52 CST 2023
;; MSG SIZE  rcvd: 107
Host info
42.187.116.140.in-addr.arpa domain name pointer sscas42.ee.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.187.116.140.in-addr.arpa	name = sscas42.ee.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.195.109.187 attack
Aug 16 10:30:56 *** sshd[15253]: Failed password for invalid user admin from 112.195.109.187 port 38003 ssh2
2019-08-17 09:28:24
178.128.112.98 attackspambots
Invalid user appuser from 178.128.112.98 port 43771
2019-08-17 09:26:51
190.121.21.210 attack
Unauthorized connection attempt from IP address 190.121.21.210 on Port 445(SMB)
2019-08-17 09:38:00
117.2.104.3 attack
Aug 16 14:26:31 *** sshd[20942]: Failed password for invalid user tit0nich from 117.2.104.3 port 60003 ssh2
2019-08-17 09:14:25
112.186.77.126 attackspam
Automatic report - Banned IP Access
2019-08-17 09:09:06
167.114.152.139 attack
Aug 17 03:27:21 SilenceServices sshd[28106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Aug 17 03:27:22 SilenceServices sshd[28106]: Failed password for invalid user donovan from 167.114.152.139 port 50286 ssh2
Aug 17 03:32:45 SilenceServices sshd[32521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
2019-08-17 09:36:46
139.59.4.224 attackspambots
$f2bV_matches_ltvn
2019-08-17 09:17:29
81.22.45.252 attackbotsspam
Port Scan: TCP/9242
2019-08-17 09:16:51
121.128.135.73 attack
IMAP brute force
...
2019-08-17 09:04:16
221.162.255.74 attack
Aug 17 00:30:01 XXX sshd[28788]: Invalid user ofsaa from 221.162.255.74 port 40776
2019-08-17 09:37:12
183.103.35.198 attackbots
Aug 16 22:42:00 sshgateway sshd\[11536\]: Invalid user jboss from 183.103.35.198
Aug 16 22:42:00 sshgateway sshd\[11536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.35.198
Aug 16 22:42:02 sshgateway sshd\[11536\]: Failed password for invalid user jboss from 183.103.35.198 port 35594 ssh2
2019-08-17 09:08:05
189.47.168.151 attackbots
Unauthorized connection attempt from IP address 189.47.168.151 on Port 445(SMB)
2019-08-17 09:04:54
50.252.117.30 attackbots
RDP Bruteforce
2019-08-17 09:17:52
209.141.34.95 attack
08/16/2019-21:03:24.750442 209.141.34.95 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 17
2019-08-17 09:16:04
216.211.250.8 attack
Triggered by Fail2Ban at Vostok web server
2019-08-17 09:35:57

Recently Reported IPs

140.116.247.164 210.72.158.4 140.116.23.126 163.25.114.242
129.94.8.25 140.116.192.163 192.149.131.109 140.116.36.4
140.116.164.133 140.116.151.79 140.116.38.74 140.116.56.150
124.16.0.106 140.116.52.199 133.82.255.125 140.116.112.45
140.116.178.115 120.114.241.21 120.110.7.60 140.116.158.233