Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.240.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.240.234.		IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 18:25:46 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 234.240.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.240.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.127.144.172 attack
failed_logins
2019-06-23 16:24:12
116.196.118.22 attackspam
Unauthorized SSH login attempts
2019-06-23 16:48:50
1.10.140.44 attackbots
WP Authentication failure
2019-06-23 16:52:14
84.22.61.46 attack
NAME : ARTMOTION_business_customers CIDR : 84.22.61.0/24 DDoS attack Albania - block certain countries :) IP: 84.22.61.46  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-23 17:00:29
177.154.236.166 attackspambots
SMTP-sasl brute force
...
2019-06-23 16:54:38
167.86.120.109 attack
23.06.2019 01:01:38 Connection to port 50802 blocked by firewall
2019-06-23 16:56:21
89.76.103.208 attack
Jun 23 07:53:03 rpi sshd\[8465\]: Invalid user Login from 89.76.103.208 port 50776
Jun 23 07:53:03 rpi sshd\[8465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.76.103.208
Jun 23 07:53:05 rpi sshd\[8465\]: Failed password for invalid user Login from 89.76.103.208 port 50776 ssh2
2019-06-23 16:39:44
185.25.11.71 attack
Unauthorized connection attempt from IP address 185.25.11.71 on Port 445(SMB)
2019-06-23 16:59:38
47.91.92.228 attackspam
Jun 23 02:08:26 mail sshd\[10774\]: Invalid user testing from 47.91.92.228
Jun 23 02:08:26 mail sshd\[10774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.92.228
Jun 23 02:08:28 mail sshd\[10774\]: Failed password for invalid user testing from 47.91.92.228 port 60224 ssh2
...
2019-06-23 16:45:29
82.209.232.5 attackspambots
Jun 22 14:38:27 xb3 sshd[31961]: Bad protocol version identification '' from 82.209.232.5 port 38978
Jun 22 14:38:28 xb3 sshd[31962]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:30 xb3 sshd[31962]: Failed password for invalid user support from 82.209.232.5 port 39062 ssh2
Jun 22 14:38:30 xb3 sshd[31962]: Connection closed by 82.209.232.5 [preauth]
Jun 22 14:38:31 xb3 sshd[31987]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:32 xb3 sshd[31987]: Failed password for invalid user ubnt from 82.209.232.5 port 42584 ssh2
Jun 22 14:38:32 xb3 sshd[31987]: Connection closed by 82.209.232.5 [preauth]
Jun 22 14:38:33 xb3 sshd[32007]: reveeclipse mapping checking getaddrinfo for mm-5-232-209-82.static.mgts.by [82.209.232.5] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 22 14:38:35 xb3 sshd[32007]: Fai........
-------------------------------
2019-06-23 16:34:30
192.169.231.22 attack
Dictionary attack on login resource.
2019-06-23 17:07:15
35.243.217.235 attack
xmlrpc attack
2019-06-23 16:50:20
58.144.150.233 attackspambots
Reported by AbuseIPDB proxy server.
2019-06-23 16:16:40
137.74.201.15 attack
Dictionary attack on login resource.
2019-06-23 16:36:41
111.93.191.38 attack
Unauthorized connection attempt from IP address 111.93.191.38 on Port 445(SMB)
2019-06-23 16:49:52

Recently Reported IPs

193.170.94.24 140.116.13.149 114.79.47.196 140.116.194.73
140.116.163.146 140.116.21.161 140.123.202.18 103.105.31.118
140.116.245.36 140.116.228.174 140.116.124.60 142.51.127.94
140.116.177.157 119.216.121.183 140.116.103.102 128.112.16.31
140.116.191.166 147.102.222.53 202.170.60.245 140.116.245.226