Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.207.88
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.207.88.			IN	A

;; AUTHORITY SECTION:
.			540	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:17:48 CST 2023
;; MSG SIZE  rcvd: 107
Host info
88.207.116.140.in-addr.arpa domain name pointer etds.lib.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
88.207.116.140.in-addr.arpa	name = etds.lib.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.211.147.251 attackspambots
"SSH brute force auth login attempt."
2020-01-23 17:20:47
182.242.138.236 attackbots
"SSH brute force auth login attempt."
2020-01-23 17:12:53
218.92.0.189 attackbotsspam
01/23/2020-03:54:06.164087 218.92.0.189 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-23 16:54:23
115.238.62.154 attackspam
Jan 23 09:50:26 localhost sshd\[1329\]: Invalid user nj from 115.238.62.154 port 29491
Jan 23 09:50:26 localhost sshd\[1329\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.62.154
Jan 23 09:50:28 localhost sshd\[1329\]: Failed password for invalid user nj from 115.238.62.154 port 29491 ssh2
2020-01-23 17:05:25
179.190.39.132 attack
firewall-block, port(s): 445/tcp
2020-01-23 17:10:39
201.32.178.190 attack
Invalid user cosmos from 201.32.178.190 port 57957
2020-01-23 17:01:26
129.211.32.25 attack
Invalid user toad from 129.211.32.25 port 51190
2020-01-23 17:11:07
165.22.247.246 attackbots
Unauthorized connection attempt detected from IP address 165.22.247.246 to port 2220 [J]
2020-01-23 17:09:14
118.126.111.108 attackspambots
"SSH brute force auth login attempt."
2020-01-23 16:52:40
51.254.206.149 attackspam
Unauthorized connection attempt detected from IP address 51.254.206.149 to port 2220 [J]
2020-01-23 16:57:36
179.111.200.155 attack
"SSH brute force auth login attempt."
2020-01-23 16:52:20
211.159.241.77 attack
2020-01-23T09:04:35.435454shield sshd\[32190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.241.77  user=root
2020-01-23T09:04:37.521812shield sshd\[32190\]: Failed password for root from 211.159.241.77 port 55692 ssh2
2020-01-23T09:07:28.960663shield sshd\[1129\]: Invalid user Guest from 211.159.241.77 port 52514
2020-01-23T09:07:28.964596shield sshd\[1129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.241.77
2020-01-23T09:07:30.799946shield sshd\[1129\]: Failed password for invalid user Guest from 211.159.241.77 port 52514 ssh2
2020-01-23 17:14:51
104.248.149.130 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 17:24:29
221.202.203.192 attackspam
"SSH brute force auth login attempt."
2020-01-23 16:55:49
125.132.148.147 attack
"SSH brute force auth login attempt."
2020-01-23 16:49:47

Recently Reported IPs

140.113.156.132 130.179.19.178 140.116.251.186 128.189.118.104
140.116.236.15 61.61.254.188 140.116.161.37 166.111.89.146
120.114.152.188 195.178.213.162 140.116.175.242 185.39.208.1
140.116.20.230 205.251.193.161 140.116.253.33 52.10.212.90
140.116.245.77 169.229.226.218 140.116.73.63 140.113.202.151