Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.20.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51022
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.20.107.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:27:57 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 107.20.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.20.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.122.177.56 attackbotsspam
Automatic report - Port Scan Attack
2020-02-29 23:34:34
49.232.171.28 attackspambots
Feb 29 17:27:35 lukav-desktop sshd\[2341\]: Invalid user cod2 from 49.232.171.28
Feb 29 17:27:35 lukav-desktop sshd\[2341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.171.28
Feb 29 17:27:37 lukav-desktop sshd\[2341\]: Failed password for invalid user cod2 from 49.232.171.28 port 55068 ssh2
Feb 29 17:28:54 lukav-desktop sshd\[2356\]: Invalid user www from 49.232.171.28
Feb 29 17:28:54 lukav-desktop sshd\[2356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.171.28
2020-02-29 23:42:21
190.145.224.18 attackbotsspam
Feb 29 16:29:27 localhost sshd\[2620\]: Invalid user oracle from 190.145.224.18 port 36078
Feb 29 16:29:27 localhost sshd\[2620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.224.18
Feb 29 16:29:28 localhost sshd\[2620\]: Failed password for invalid user oracle from 190.145.224.18 port 36078 ssh2
2020-02-29 23:32:26
222.186.42.136 attackspam
Automatic report BANNED IP
2020-02-29 23:43:49
195.116.48.234 attackspambots
Unauthorized connection attempt detected from IP address 195.116.48.234 to port 8080 [J]
2020-03-01 00:08:11
31.171.224.46 attack
20/2/29@09:26:55: FAIL: Alarm-Telnet address from=31.171.224.46
...
2020-02-29 23:30:31
106.3.44.235 attack
Automatic report - Port Scan
2020-03-01 00:01:34
49.88.112.116 attackbots
Failed password for root from 49.88.112.116 port 25983 ssh2
Failed password for root from 49.88.112.116 port 25983 ssh2
Failed password for root from 49.88.112.116 port 25983 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Failed password for root from 49.88.112.116 port 40838 ssh2
2020-02-29 23:46:01
162.62.17.4 attack
Unauthorized connection attempt detected from IP address 162.62.17.4 to port 19 [J]
2020-03-01 00:17:47
36.26.64.143 attackbotsspam
Feb 29 16:21:24 localhost sshd\[30230\]: Invalid user lianwei from 36.26.64.143 port 53664
Feb 29 16:21:24 localhost sshd\[30230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.64.143
Feb 29 16:21:26 localhost sshd\[30230\]: Failed password for invalid user lianwei from 36.26.64.143 port 53664 ssh2
2020-02-29 23:30:11
122.117.113.71 attackspambots
" "
2020-02-29 23:36:07
165.22.31.24 attackbots
$f2bV_matches
2020-02-29 23:47:36
189.69.70.142 attackspambots
Unauthorized connection attempt detected from IP address 189.69.70.142 to port 23 [J]
2020-03-01 00:09:57
37.187.122.195 attack
Feb 29 11:05:34 server sshd\[30834\]: Failed password for invalid user ubuntu from 37.187.122.195 port 57818 ssh2
Feb 29 17:11:42 server sshd\[1855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns332025.ip-37-187-122.eu  user=root
Feb 29 17:11:43 server sshd\[1855\]: Failed password for root from 37.187.122.195 port 42846 ssh2
Feb 29 17:26:33 server sshd\[4729\]: Invalid user test from 37.187.122.195
Feb 29 17:26:33 server sshd\[4729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns332025.ip-37-187-122.eu 
...
2020-02-29 23:50:28
190.158.244.119 attack
Unauthorized connection attempt detected from IP address 190.158.244.119 to port 23 [J]
2020-03-01 00:09:02

Recently Reported IPs

102.189.61.70 79.123.156.20 114.79.7.70 193.219.76.240
140.116.122.65 194.141.12.1 140.116.48.199 140.116.16.235
140.120.29.205 114.142.172.38 141.85.0.106 193.146.5.15
193.137.9.145 140.116.190.49 202.67.40.27 131.246.1.116
140.116.137.169 140.123.112.155 140.116.75.49 140.116.253.70