Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.243.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.243.6.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050100 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 21:37:16 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 6.243.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.243.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
119.161.156.11 attack
Invalid user gmp from 119.161.156.11 port 45278
2020-01-10 22:34:44
115.249.205.29 attack
Invalid user tommy from 115.249.205.29 port 43499
2020-01-10 22:37:00
201.149.20.162 attackspam
Invalid user user from 201.149.20.162 port 32864
2020-01-10 22:24:13
119.194.23.211 attackbots
unauthorized connection attempt
2020-01-10 22:34:30
174.138.44.30 attackbotsspam
Jan 10 14:08:59 IngegnereFirenze sshd[2577]: User root from 174.138.44.30 not allowed because not listed in AllowUsers
...
2020-01-10 22:28:20
145.239.198.218 attackspam
$f2bV_matches
2020-01-10 22:13:07
123.207.167.185 attack
Invalid user wildfly from 123.207.167.185 port 36202
2020-01-10 22:33:05
47.22.80.98 attackbotsspam
Jan 10 08:21:15 ny01 sshd[23426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.22.80.98
Jan 10 08:21:17 ny01 sshd[23426]: Failed password for invalid user ubuntu from 47.22.80.98 port 2737 ssh2
Jan 10 08:30:17 ny01 sshd[24739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.22.80.98
2020-01-10 22:07:41
178.62.37.168 attack
Invalid user oracle from 178.62.37.168 port 51598
2020-01-10 22:10:50
112.3.30.116 attack
Invalid user fkz from 112.3.30.116 port 49520
2020-01-10 22:15:54
186.147.35.76 attackspam
Invalid user db2adm1 from 186.147.35.76 port 35781
2020-01-10 22:09:49
148.235.57.183 attackbotsspam
$f2bV_matches
2020-01-10 22:04:50
132.232.79.135 attack
Invalid user nexus from 132.232.79.135 port 59508
2020-01-10 22:31:38
106.12.43.142 attack
01/10/2020-09:12:37.326726 106.12.43.142 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-10 22:16:24
156.221.116.240 attackspambots
Invalid user admin from 156.221.116.240 port 33039
2020-01-10 22:29:16

Recently Reported IPs

140.116.74.42 140.116.24.179 131.227.95.144 140.116.83.190
134.208.50.73 46.222.38.212 128.104.108.26 140.116.36.11
192.65.187.5 140.116.245.65 140.116.49.246 140.116.91.147
140.116.103.158 193.225.63.9 140.116.111.15 132.248.233.11
171.38.146.157 116.206.30.43 140.116.47.108 140.116.119.60