Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.241.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.241.55.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051600 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 16 17:34:47 CST 2023
;; MSG SIZE  rcvd: 107
Host info
55.241.116.140.in-addr.arpa domain name pointer web.cc.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.241.116.140.in-addr.arpa	name = web.cc.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.72.137.110 attackbotsspam
Mar 20 05:00:00 [host] sshd[30309]: Invalid user a
Mar 20 05:00:00 [host] sshd[30309]: pam_unix(sshd:
Mar 20 05:00:02 [host] sshd[30309]: Failed passwor
2020-03-20 12:30:16
123.207.142.208 attackbotsspam
$f2bV_matches
2020-03-20 12:15:28
61.216.2.79 attackspambots
Unauthorized SSH login attempts
2020-03-20 12:29:59
118.69.32.167 attack
Mar 20 04:44:49 h2646465 sshd[1755]: Invalid user changem from 118.69.32.167
Mar 20 04:44:49 h2646465 sshd[1755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.32.167
Mar 20 04:44:49 h2646465 sshd[1755]: Invalid user changem from 118.69.32.167
Mar 20 04:44:51 h2646465 sshd[1755]: Failed password for invalid user changem from 118.69.32.167 port 54766 ssh2
Mar 20 04:55:17 h2646465 sshd[5525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.32.167  user=root
Mar 20 04:55:18 h2646465 sshd[5525]: Failed password for root from 118.69.32.167 port 35644 ssh2
Mar 20 05:00:05 h2646465 sshd[6740]: Invalid user daniel from 118.69.32.167
Mar 20 05:00:05 h2646465 sshd[6740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.32.167
Mar 20 05:00:05 h2646465 sshd[6740]: Invalid user daniel from 118.69.32.167
Mar 20 05:00:07 h2646465 sshd[6740]: Failed password for invalid user daniel fro
2020-03-20 12:21:44
88.157.229.58 attackbotsspam
Mar 20 01:00:20 firewall sshd[13019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.157.229.58
Mar 20 01:00:20 firewall sshd[13019]: Invalid user eleve from 88.157.229.58
Mar 20 01:00:22 firewall sshd[13019]: Failed password for invalid user eleve from 88.157.229.58 port 50532 ssh2
...
2020-03-20 12:02:40
89.46.214.161 attack
SSH login attempts.
2020-03-20 12:12:52
61.177.172.128 attackbots
Mar 20 05:34:49 eventyay sshd[2763]: Failed password for root from 61.177.172.128 port 65487 ssh2
Mar 20 05:34:52 eventyay sshd[2763]: Failed password for root from 61.177.172.128 port 65487 ssh2
Mar 20 05:35:03 eventyay sshd[2763]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 65487 ssh2 [preauth]
...
2020-03-20 12:41:26
197.51.239.102 attack
Mar 20 03:35:40 XXXXXX sshd[58213]: Invalid user jira from 197.51.239.102 port 33748
2020-03-20 12:41:01
202.142.170.82 attackspambots
Mar 20 04:53:08 OPSO sshd\[17604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.142.170.82  user=root
Mar 20 04:53:10 OPSO sshd\[17604\]: Failed password for root from 202.142.170.82 port 32129 ssh2
Mar 20 04:56:40 OPSO sshd\[18345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.142.170.82  user=root
Mar 20 04:56:42 OPSO sshd\[18345\]: Failed password for root from 202.142.170.82 port 53537 ssh2
Mar 20 05:00:18 OPSO sshd\[18765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.142.170.82  user=root
2020-03-20 12:08:28
175.158.216.94 attackbots
1584676800 - 03/20/2020 05:00:00 Host: 175.158.216.94/175.158.216.94 Port: 445 TCP Blocked
2020-03-20 12:43:28
162.243.133.206 attackbots
firewall-block, port(s): 9002/tcp
2020-03-20 12:45:08
186.24.50.165 attackspam
Spammer
2020-03-20 12:18:45
40.112.57.190 attackbotsspam
2020-03-20T04:59:58.067292v22018076590370373 sshd[6155]: Invalid user v from 40.112.57.190 port 46880
2020-03-20T04:59:58.072194v22018076590370373 sshd[6155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.57.190
2020-03-20T04:59:58.067292v22018076590370373 sshd[6155]: Invalid user v from 40.112.57.190 port 46880
2020-03-20T04:59:59.644496v22018076590370373 sshd[6155]: Failed password for invalid user v from 40.112.57.190 port 46880 ssh2
2020-03-20T05:04:47.178956v22018076590370373 sshd[25978]: Invalid user ubuntu from 40.112.57.190 port 47352
...
2020-03-20 12:34:42
61.233.147.136 attackspam
Mar 20 05:00:04 debian-2gb-nbg1-2 kernel: \[6935908.677797\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=61.233.147.136 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0xE0 TTL=43 ID=28986 PROTO=TCP SPT=23446 DPT=23 WINDOW=41815 RES=0x00 SYN URGP=0
2020-03-20 12:24:10
218.92.0.158 attackspam
Mar 20 05:00:19 srv206 sshd[28212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Mar 20 05:00:21 srv206 sshd[28212]: Failed password for root from 218.92.0.158 port 47803 ssh2
...
2020-03-20 12:03:45

Recently Reported IPs

163.19.149.1 140.123.44.50 140.116.191.10 103.88.46.29
140.116.179.249 120.105.145.156 202.67.46.19 140.116.31.100
202.67.46.233 196.43.135.56 140.116.86.166 140.116.247.38
202.143.137.59 140.116.79.88 140.116.69.94 193.6.168.15
140.116.206.190 140.116.117.80 134.176.203.236 103.195.142.59