Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.205.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26699
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.205.20.			IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 18:01:01 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 20.205.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.205.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.207.90.235 attack
Unauthorised access (May  2) SRC=115.207.90.235 LEN=44 TTL=52 ID=2558 TCP DPT=8080 WINDOW=8909 SYN 
Unauthorised access (May  2) SRC=115.207.90.235 LEN=44 TTL=52 ID=20310 TCP DPT=8080 WINDOW=42451 SYN 
Unauthorised access (May  1) SRC=115.207.90.235 LEN=44 TTL=52 ID=51235 TCP DPT=8080 WINDOW=4541 SYN 
Unauthorised access (May  1) SRC=115.207.90.235 LEN=44 TTL=52 ID=29961 TCP DPT=8080 WINDOW=8909 SYN 
Unauthorised access (May  1) SRC=115.207.90.235 LEN=44 TTL=52 ID=47481 TCP DPT=8080 WINDOW=42451 SYN 
Unauthorised access (Apr 30) SRC=115.207.90.235 LEN=44 TTL=52 ID=42230 TCP DPT=8080 WINDOW=1335 SYN 
Unauthorised access (Apr 29) SRC=115.207.90.235 LEN=44 TTL=52 ID=27068 TCP DPT=8080 WINDOW=42451 SYN
2020-05-03 03:36:10
217.182.71.54 attackbots
Invalid user oracle from 217.182.71.54 port 56940
2020-05-03 03:48:31
167.172.133.221 attack
2020-05-02T11:06:35.646950-07:00 suse-nuc sshd[12379]: Invalid user uki from 167.172.133.221 port 54456
...
2020-05-03 03:59:17
176.59.47.116 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-03 03:57:38
45.236.131.60 attack
May  2 14:10:47 ovh sshd[5903]: Failed password for root from 45.236.131.60 port 59334 ssh2
2020-05-03 03:40:52
98.143.148.45 attackspambots
May  2 17:07:53 XXX sshd[9380]: Invalid user rt from 98.143.148.45 port 44880
2020-05-03 04:13:38
35.199.73.100 attackspambots
2020-05-03T02:39:38.375215vivaldi2.tree2.info sshd[6784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.73.199.35.bc.googleusercontent.com
2020-05-03T02:39:38.354834vivaldi2.tree2.info sshd[6784]: Invalid user test from 35.199.73.100
2020-05-03T02:39:41.137515vivaldi2.tree2.info sshd[6784]: Failed password for invalid user test from 35.199.73.100 port 59256 ssh2
2020-05-03T02:44:05.740076vivaldi2.tree2.info sshd[7084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.73.199.35.bc.googleusercontent.com  user=root
2020-05-03T02:44:07.824738vivaldi2.tree2.info sshd[7084]: Failed password for root from 35.199.73.100 port 42234 ssh2
...
2020-05-03 03:43:33
2.137.121.119 attackspam
[01/May/2020:10:47:56 -0400] "GET / HTTP/1.1" "Mozilla/5.0 zgrab/0.x"
2020-05-03 03:48:09
197.44.37.239 attack
Honeypot attack, port: 445, PTR: host-197.44.37.239-static.tedata.net.
2020-05-03 04:00:37
142.93.59.35 attackbots
142.93.59.35 - - [02/May/2020:18:04:01 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.59.35 - - [02/May/2020:18:04:02 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.59.35 - - [02/May/2020:18:04:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-03 03:43:47
198.23.189.18 attackbots
2020-05-02T22:36:37.041881vivaldi2.tree2.info sshd[24257]: Failed password for invalid user student3 from 198.23.189.18 port 41790 ssh2
2020-05-02T22:38:33.994592vivaldi2.tree2.info sshd[24328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18  user=root
2020-05-02T22:38:36.251422vivaldi2.tree2.info sshd[24328]: Failed password for root from 198.23.189.18 port 52128 ssh2
2020-05-02T22:40:30.681520vivaldi2.tree2.info sshd[24508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.189.18  user=root
2020-05-02T22:40:32.666606vivaldi2.tree2.info sshd[24508]: Failed password for root from 198.23.189.18 port 34220 ssh2
...
2020-05-03 03:47:21
191.232.235.83 attackspambots
2020-05-02T21:36:52.939136rocketchat.forhosting.nl sshd[24254]: Invalid user deploy from 191.232.235.83 port 47924
2020-05-02T21:36:54.301688rocketchat.forhosting.nl sshd[24254]: Failed password for invalid user deploy from 191.232.235.83 port 47924 ssh2
2020-05-02T21:42:25.548645rocketchat.forhosting.nl sshd[24349]: Invalid user suresh from 191.232.235.83 port 45122
...
2020-05-03 03:43:17
191.189.30.241 attackbotsspam
"fail2ban match"
2020-05-03 04:12:07
36.152.23.123 attackbotsspam
Lines containing failures of 36.152.23.123
May  1 14:40:01 ghostnameioc sshd[15965]: Invalid user admin from 36.152.23.123 port 6916
May  1 14:40:01 ghostnameioc sshd[15965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.152.23.123 
May  1 14:40:03 ghostnameioc sshd[15965]: Failed password for invalid user admin from 36.152.23.123 port 6916 ssh2
May  1 14:40:04 ghostnameioc sshd[15965]: Received disconnect from 36.152.23.123 port 6916:11: Bye Bye [preauth]
May  1 14:40:04 ghostnameioc sshd[15965]: Disconnected from invalid user admin 36.152.23.123 port 6916 [preauth]
May  1 14:51:00 ghostnameioc sshd[16196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.152.23.123  user=r.r
May  1 14:51:02 ghostnameioc sshd[16196]: Failed password for r.r from 36.152.23.123 port 42101 ssh2
May  1 14:51:04 ghostnameioc sshd[16196]: Received disconnect from 36.152.23.123 port 42101:11: Bye Bye [preaut........
------------------------------
2020-05-03 04:00:06
173.54.58.51 attack
Honeypot attack, port: 5555, PTR: pool-173-54-58-51.nwrknj.fios.verizon.net.
2020-05-03 04:08:49

Recently Reported IPs

140.116.151.55 35.180.53.6 120.108.101.136 140.116.164.151
115.178.251.215 115.178.223.29 143.248.94.90 193.136.157.66
140.116.237.152 128.195.99.230 140.120.187.134 140.116.8.127
140.116.203.50 128.95.120.1 65.210.113.49 140.116.85.196
137.189.207.17 140.116.126.83 10.6.182.48 140.116.219.70