Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.229.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7186
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.229.121.		IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:16:42 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 121.229.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.229.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
160.153.154.142 attackbotsspam
160.153.154.142 - - [01/Oct/2019:23:51:12 -0400] "GET /?action=view&manufacturerID=158&productID=29211&linkID=13000&redirect=1&page=products1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45)--%20%20 HTTP/1.1" 302 379 "-" "-"
160.153.154.142 - - [01/Oct/2019:23:51:13 -0400] "GET /?action=view&manufacturerID=158&productID=29211&linkID=13000&redirect=1&page=products1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45)--%20%20 HTTP/1.1" 200 56468 "-" "-"
...
2019-10-02 14:58:42
111.230.29.17 attackspambots
Oct  2 09:45:36 areeb-Workstation sshd[1215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.29.17
Oct  2 09:45:38 areeb-Workstation sshd[1215]: Failed password for invalid user xd from 111.230.29.17 port 44388 ssh2
...
2019-10-02 14:27:38
208.58.129.131 attackspam
Oct  2 05:58:42 game-panel sshd[12262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.58.129.131
Oct  2 05:58:45 game-panel sshd[12262]: Failed password for invalid user tery from 208.58.129.131 port 60720 ssh2
Oct  2 06:03:19 game-panel sshd[12397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.58.129.131
2019-10-02 14:21:18
69.90.16.116 attackbotsspam
Oct  2 11:59:23 webhost01 sshd[13429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116
Oct  2 11:59:25 webhost01 sshd[13429]: Failed password for invalid user costin from 69.90.16.116 port 55758 ssh2
...
2019-10-02 14:51:40
158.181.40.1 attackbotsspam
Oct  2 05:33:35 mxgate1 postfix/postscreen[4705]: CONNECT from [158.181.40.1]:11923 to [176.31.12.44]:25
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5005]: addr 158.181.40.1 listed by domain cbl.abuseat.org as 127.0.0.2
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5004]: addr 158.181.40.1 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5006]: addr 158.181.40.1 listed by domain b.barracudacentral.org as 127.0.0.2
Oct  2 05:33:41 mxgate1 postfix/postscreen[4705]: DNSBL rank 5 for [158.181.40.1]:11923
Oct x@x
Oct  2 05:33:42 mxgate1 postfix/postscreen[4705]: HANGUP after 0.71 from [158.181.40.1]:11923 in tests........
-------------------------------
2019-10-02 15:01:10
218.161.72.89 attackbots
" "
2019-10-02 14:44:24
120.27.100.100 attackbots
/wp-login.php
2019-10-02 14:18:46
178.128.114.248 attackbots
" "
2019-10-02 14:16:49
193.112.48.179 attackspam
Oct  2 06:16:08 ns3110291 sshd\[11082\]: Invalid user 123456 from 193.112.48.179
Oct  2 06:16:08 ns3110291 sshd\[11082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.48.179 
Oct  2 06:16:10 ns3110291 sshd\[11082\]: Failed password for invalid user 123456 from 193.112.48.179 port 48376 ssh2
Oct  2 06:19:16 ns3110291 sshd\[11185\]: Invalid user changeme from 193.112.48.179
Oct  2 06:19:16 ns3110291 sshd\[11185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.48.179 
...
2019-10-02 14:32:24
203.195.171.126 attack
Oct  2 06:36:26 microserver sshd[18185]: Invalid user dave from 203.195.171.126 port 35436
Oct  2 06:36:26 microserver sshd[18185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.171.126
Oct  2 06:36:29 microserver sshd[18185]: Failed password for invalid user dave from 203.195.171.126 port 35436 ssh2
Oct  2 06:40:19 microserver sshd[18751]: Invalid user urban from 203.195.171.126 port 54046
Oct  2 06:40:19 microserver sshd[18751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.171.126
Oct  2 06:52:03 microserver sshd[20197]: Invalid user nvidia from 203.195.171.126 port 53418
Oct  2 06:52:03 microserver sshd[20197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.171.126
Oct  2 06:52:06 microserver sshd[20197]: Failed password for invalid user nvidia from 203.195.171.126 port 53418 ssh2
Oct  2 06:55:59 microserver sshd[20799]: Invalid user ts3 from 203.195.171.126
2019-10-02 14:30:55
123.214.186.186 attack
10/02/2019-02:19:06.989901 123.214.186.186 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 6
2019-10-02 14:52:22
1.55.17.162 attackspambots
Oct  2 07:05:18 site3 sshd\[204573\]: Invalid user git from 1.55.17.162
Oct  2 07:05:18 site3 sshd\[204573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.17.162
Oct  2 07:05:21 site3 sshd\[204573\]: Failed password for invalid user git from 1.55.17.162 port 54264 ssh2
Oct  2 07:10:02 site3 sshd\[204742\]: Invalid user varsha from 1.55.17.162
Oct  2 07:10:02 site3 sshd\[204742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.17.162
...
2019-10-02 14:53:45
84.208.62.38 attackspambots
2019-10-02T09:39:20.226649tmaserv sshd\[3469\]: Invalid user uploader from 84.208.62.38 port 60896
2019-10-02T09:39:20.230148tmaserv sshd\[3469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.208.62.38.getinternet.no
2019-10-02T09:39:22.245980tmaserv sshd\[3469\]: Failed password for invalid user uploader from 84.208.62.38 port 60896 ssh2
2019-10-02T09:43:08.092831tmaserv sshd\[3786\]: Invalid user odroid from 84.208.62.38 port 45458
2019-10-02T09:43:08.096759tmaserv sshd\[3786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.208.62.38.getinternet.no
2019-10-02T09:43:09.747400tmaserv sshd\[3786\]: Failed password for invalid user odroid from 84.208.62.38 port 45458 ssh2
...
2019-10-02 14:46:05
43.242.125.185 attackbotsspam
SSH Brute Force
2019-10-02 15:01:35
92.249.143.33 attackbotsspam
Oct  2 06:56:52 apollo sshd\[9122\]: Invalid user ht from 92.249.143.33Oct  2 06:56:54 apollo sshd\[9122\]: Failed password for invalid user ht from 92.249.143.33 port 54096 ssh2Oct  2 07:03:21 apollo sshd\[9139\]: Invalid user guest from 92.249.143.33
...
2019-10-02 14:37:57

Recently Reported IPs

120.125.190.101 140.123.3.185 140.116.194.63 140.116.159.246
82.139.136.180 115.178.205.86 140.116.193.93 251.69.38.32
140.116.16.234 146.111.146.144 202.146.182.18 140.116.165.125
186.236.30.175 140.116.183.196 140.116.87.21 202.90.136.142
10.7.210.203 140.116.216.242 182.255.120.92 140.116.89.221