Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.220.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30390
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.220.139.		IN	A

;; AUTHORITY SECTION:
.			278	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 09:02:31 CST 2023
;; MSG SIZE  rcvd: 108
Host info
139.220.116.140.in-addr.arpa domain name pointer www.icid.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.220.116.140.in-addr.arpa	name = www.icid.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.68.90.230 attackbots
SSH Brute Force
2020-07-05 21:04:41
182.61.136.26 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-05 20:54:38
125.124.120.123 attack
SSH Brute Force
2020-07-05 21:01:06
164.132.57.16 attackspambots
SSH Brute Force
2020-07-05 21:11:31
198.50.194.0 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-07-05 21:24:31
192.241.224.136 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 1931 proto: TCP cat: Misc Attack
2020-07-05 21:25:54
79.11.236.77 attackspam
Jul  5 14:19:19 vmd26974 sshd[27728]: Failed password for root from 79.11.236.77 port 50147 ssh2
Jul  5 14:33:32 vmd26974 sshd[19234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.11.236.77
...
2020-07-05 21:04:53
106.53.94.190 attackspam
SSH Brute Force
2020-07-05 21:17:54
176.28.126.135 attack
prod11
...
2020-07-05 20:57:25
177.105.60.118 attackspam
SSH Brute Force
2020-07-05 20:56:59
159.65.129.87 attack
SSH Brute Force
2020-07-05 20:58:08
104.248.121.165 attack
Jul  5 14:15:13 rocket sshd[6981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.165
Jul  5 14:15:15 rocket sshd[6981]: Failed password for invalid user teamspeak from 104.248.121.165 port 48234 ssh2
Jul  5 14:18:25 rocket sshd[7060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.165
...
2020-07-05 21:18:49
185.143.75.153 attack
Jul  4 14:56:11 statusweb1.srvfarm.net postfix/smtpd[22043]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  4 14:56:36 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  4 14:57:02 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  4 14:57:28 statusweb1.srvfarm.net postfix/smtpd[22043]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  4 14:57:54 statusweb1.srvfarm.net postfix/smtpd[20523]: warning: unknown[185.143.75.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-05 21:08:59
177.131.6.15 attack
SSH Brute Force
2020-07-05 20:56:34
54.37.71.204 attackbotsspam
Jul  5 14:37:22 vserver sshd\[9688\]: Invalid user zj from 54.37.71.204Jul  5 14:37:24 vserver sshd\[9688\]: Failed password for invalid user zj from 54.37.71.204 port 50744 ssh2Jul  5 14:40:45 vserver sshd\[10081\]: Invalid user konan from 54.37.71.204Jul  5 14:40:47 vserver sshd\[10081\]: Failed password for invalid user konan from 54.37.71.204 port 47370 ssh2
...
2020-07-05 21:05:28

Recently Reported IPs

114.79.38.46 113.188.252.65 140.116.205.116 180.183.118.241
140.123.5.6 223.202.132.168 133.3.250.204 140.116.215.104
140.193.228.107 140.116.192.77 140.116.215.250 140.116.177.3
120.105.145.192 140.116.88.253 146.64.10.11 119.78.162.103
129.2.181.184 119.78.165.86 193.227.20.138 66.205.160.99