Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.20.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24884
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.20.219.			IN	A

;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 17:25:26 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 219.20.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.20.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.106.9.125 attack
Jul 24 08:08:32 h2646465 sshd[332]: Invalid user user from 170.106.9.125
Jul 24 08:08:32 h2646465 sshd[332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.9.125
Jul 24 08:08:32 h2646465 sshd[332]: Invalid user user from 170.106.9.125
Jul 24 08:08:34 h2646465 sshd[332]: Failed password for invalid user user from 170.106.9.125 port 32812 ssh2
Jul 24 08:18:10 h2646465 sshd[1788]: Invalid user victoria from 170.106.9.125
Jul 24 08:18:10 h2646465 sshd[1788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.9.125
Jul 24 08:18:10 h2646465 sshd[1788]: Invalid user victoria from 170.106.9.125
Jul 24 08:18:13 h2646465 sshd[1788]: Failed password for invalid user victoria from 170.106.9.125 port 42808 ssh2
Jul 24 10:19:01 h2646465 sshd[17837]: Invalid user sc from 170.106.9.125
...
2020-07-24 17:00:27
51.254.37.156 attackbotsspam
2020-07-24T08:25:42.099971n23.at sshd[1242672]: Invalid user btm from 51.254.37.156 port 34396
2020-07-24T08:25:44.196654n23.at sshd[1242672]: Failed password for invalid user btm from 51.254.37.156 port 34396 ssh2
2020-07-24T08:37:21.293404n23.at sshd[1252468]: Invalid user etk from 51.254.37.156 port 53254
...
2020-07-24 16:58:40
81.68.123.185 attack
Jul 24 04:03:03 r.ca sshd[27642]: Failed password for invalid user tibero6 from 81.68.123.185 port 41742 ssh2
2020-07-24 16:56:02
5.53.138.183 attackspam
1595567897 - 07/24/2020 07:18:17 Host: 5.53.138.183/5.53.138.183 Port: 445 TCP Blocked
2020-07-24 16:41:28
182.187.30.189 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-24 16:51:41
51.15.241.102 attack
Failed password for invalid user ansible from 51.15.241.102 port 49520 ssh2
2020-07-24 16:38:36
77.21.237.128 attackbots
SSH Brute-Force reported by Fail2Ban
2020-07-24 16:39:54
47.103.148.115 attackspam
Jul 24 07:03:07 server sshd[28128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.103.148.115
Jul 24 07:03:09 server sshd[28128]: Failed password for invalid user malcolm from 47.103.148.115 port 58867 ssh2
Jul 24 07:18:15 server sshd[29034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.103.148.115
Jul 24 07:18:17 server sshd[29034]: Failed password for invalid user adm from 47.103.148.115 port 18284 ssh2
2020-07-24 16:41:01
178.62.12.192 attack
firewall-block, port(s): 11994/tcp
2020-07-24 17:06:17
37.187.21.81 attack
Jul 24 08:50:59 OPSO sshd\[31585\]: Invalid user wsd from 37.187.21.81 port 37284
Jul 24 08:50:59 OPSO sshd\[31585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
Jul 24 08:51:01 OPSO sshd\[31585\]: Failed password for invalid user wsd from 37.187.21.81 port 37284 ssh2
Jul 24 08:57:45 OPSO sshd\[32233\]: Invalid user tomcat from 37.187.21.81 port 43805
Jul 24 08:57:45 OPSO sshd\[32233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.21.81
2020-07-24 17:03:10
129.204.125.233 attack
2020-07-24T05:18:01.432646randservbullet-proofcloud-66.localdomain sshd[1135]: Invalid user user from 129.204.125.233 port 55822
2020-07-24T05:18:01.436886randservbullet-proofcloud-66.localdomain sshd[1135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.125.233
2020-07-24T05:18:01.432646randservbullet-proofcloud-66.localdomain sshd[1135]: Invalid user user from 129.204.125.233 port 55822
2020-07-24T05:18:03.685550randservbullet-proofcloud-66.localdomain sshd[1135]: Failed password for invalid user user from 129.204.125.233 port 55822 ssh2
...
2020-07-24 16:57:20
218.92.0.249 attackspambots
Jul 24 10:44:59 abendstille sshd\[17248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.249  user=root
Jul 24 10:45:01 abendstille sshd\[17248\]: Failed password for root from 218.92.0.249 port 21275 ssh2
Jul 24 10:45:05 abendstille sshd\[17248\]: Failed password for root from 218.92.0.249 port 21275 ssh2
Jul 24 10:45:07 abendstille sshd\[17248\]: Failed password for root from 218.92.0.249 port 21275 ssh2
Jul 24 10:45:11 abendstille sshd\[17248\]: Failed password for root from 218.92.0.249 port 21275 ssh2
...
2020-07-24 16:46:19
118.25.182.118 attackbots
Jul 24 08:05:53 vmd36147 sshd[8695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.182.118
Jul 24 08:05:56 vmd36147 sshd[8695]: Failed password for invalid user oracle from 118.25.182.118 port 60774 ssh2
Jul 24 08:11:46 vmd36147 sshd[21894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.182.118
...
2020-07-24 16:47:23
176.31.102.37 attackbots
Jul 24 00:32:56 dignus sshd[31786]: Failed password for invalid user mircea from 176.31.102.37 port 57902 ssh2
Jul 24 00:37:07 dignus sshd[32487]: Invalid user startup from 176.31.102.37 port 36589
Jul 24 00:37:07 dignus sshd[32487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.102.37
Jul 24 00:37:09 dignus sshd[32487]: Failed password for invalid user startup from 176.31.102.37 port 36589 ssh2
Jul 24 00:41:19 dignus sshd[709]: Invalid user tanya from 176.31.102.37 port 43161
...
2020-07-24 16:40:28
14.190.200.68 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-24 16:37:27

Recently Reported IPs

103.44.37.153 140.116.24.248 140.116.66.183 140.116.132.220
210.240.248.65 124.16.128.197 116.206.38.45 150.203.2.216
140.116.110.174 195.246.39.2 129.194.51.242 140.116.136.64
130.102.189.153 193.255.143.131 140.113.233.77 158.140.187.201
149.156.96.164 207.241.233.121 140.116.43.251 140.130.1.8