Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.194.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55919
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.194.108.		IN	A

;; AUTHORITY SECTION:
.			100	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:23:41 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 108.194.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.194.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.71.141.62 attack
(sshd) Failed SSH login from 218.71.141.62 (mx.d-thinker.org): 5 in the last 3600 secs
2020-04-22 01:55:25
51.89.22.198 attackspambots
SSH login attempts.
2020-04-22 01:39:12
47.190.3.185 attack
Invalid user elsearch from 47.190.3.185 port 45832
2020-04-22 01:41:37
46.51.219.44 attack
Invalid user git from 46.51.219.44 port 9224
2020-04-22 01:42:53
88.218.17.217 attackspam
Invalid user nl from 88.218.17.217 port 48540
2020-04-22 01:31:26
27.150.183.32 attackbotsspam
prod3
...
2020-04-22 01:48:53
213.55.2.212 attack
prod3
...
2020-04-22 01:57:35
51.254.32.133 attackbotsspam
Apr 21 11:47:12 mail sshd\[25258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.133  user=root
...
2020-04-22 01:38:19
211.159.147.35 attackspam
Invalid user xz from 211.159.147.35 port 58002
2020-04-22 01:58:49
37.59.232.6 attackspam
Apr 21 20:25:10 pkdns2 sshd\[50154\]: Invalid user iy from 37.59.232.6Apr 21 20:25:12 pkdns2 sshd\[50154\]: Failed password for invalid user iy from 37.59.232.6 port 40730 ssh2Apr 21 20:29:06 pkdns2 sshd\[50286\]: Invalid user qc from 37.59.232.6Apr 21 20:29:08 pkdns2 sshd\[50286\]: Failed password for invalid user qc from 37.59.232.6 port 54476 ssh2Apr 21 20:32:54 pkdns2 sshd\[50454\]: Invalid user tester from 37.59.232.6Apr 21 20:32:56 pkdns2 sshd\[50454\]: Failed password for invalid user tester from 37.59.232.6 port 40002 ssh2
...
2020-04-22 01:45:56
54.37.226.123 attackspam
Brute-force attempt banned
2020-04-22 01:36:53
95.88.128.23 attackbotsspam
Apr 21 16:33:31 xeon sshd[64611]: Failed password for invalid user testadmin from 95.88.128.23 port 59025 ssh2
2020-04-22 01:29:22
222.86.159.208 attackbotsspam
2020-04-21T13:36:17.026836abusebot-4.cloudsearch.cf sshd[22438]: Invalid user ge from 222.86.159.208 port 34203
2020-04-21T13:36:17.034807abusebot-4.cloudsearch.cf sshd[22438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.86.159.208
2020-04-21T13:36:17.026836abusebot-4.cloudsearch.cf sshd[22438]: Invalid user ge from 222.86.159.208 port 34203
2020-04-21T13:36:19.587835abusebot-4.cloudsearch.cf sshd[22438]: Failed password for invalid user ge from 222.86.159.208 port 34203 ssh2
2020-04-21T13:38:44.380286abusebot-4.cloudsearch.cf sshd[22565]: Invalid user te from 222.86.159.208 port 50455
2020-04-21T13:38:44.388812abusebot-4.cloudsearch.cf sshd[22565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.86.159.208
2020-04-21T13:38:44.380286abusebot-4.cloudsearch.cf sshd[22565]: Invalid user te from 222.86.159.208 port 50455
2020-04-21T13:38:46.455180abusebot-4.cloudsearch.cf sshd[22565]: Failed passwor
...
2020-04-22 01:54:30
31.202.97.15 attackbots
Invalid user pi from 31.202.97.15 port 51878
2020-04-22 01:47:37
46.101.245.176 attackspambots
Brute-force attempt banned
2020-04-22 01:42:21

Recently Reported IPs

140.116.131.101 131.159.66.70 14.139.125.192 10.3.202.92
140.116.123.65 184.171.92.30 140.116.84.95 195.246.54.228
219.192.23.46 200.145.46.133 128.197.41.108 140.128.20.177
128.139.6.66 120.77.40.70 140.110.143.158 140.116.66.201
140.116.114.185 140.116.159.54 193.140.168.4 140.125.251.195