Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.244.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13875
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.244.83.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:50:47 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 83.244.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.244.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.55.39.240 attackspam
Automatic report - Banned IP Access
2019-08-13 18:42:42
122.14.199.102 attack
Aug 13 10:10:46 minden010 sshd[26472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.14.199.102
Aug 13 10:10:47 minden010 sshd[26472]: Failed password for invalid user zw from 122.14.199.102 port 60905 ssh2
Aug 13 10:18:04 minden010 sshd[28933]: Failed password for messagebus from 122.14.199.102 port 52115 ssh2
...
2019-08-13 18:05:14
190.95.221.158 attack
Unauthorized SSH connection attempt
2019-08-13 18:37:08
177.19.255.17 attackbots
Aug 13 13:15:40 server sshd\[16725\]: Invalid user icosftp from 177.19.255.17 port 36304
Aug 13 13:15:40 server sshd\[16725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.255.17
Aug 13 13:15:42 server sshd\[16725\]: Failed password for invalid user icosftp from 177.19.255.17 port 36304 ssh2
Aug 13 13:23:31 server sshd\[15967\]: Invalid user lbitcku from 177.19.255.17 port 57478
Aug 13 13:23:31 server sshd\[15967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.19.255.17
2019-08-13 18:41:13
176.59.38.171 attack
dmarc report from: Mail.Ru
[reports:1]
[domains:1]
scam dkim: sendgrid.info
2019-08-13 18:21:48
139.59.41.154 attackspam
Aug 13 10:45:21 debian sshd\[27588\]: Invalid user monitoring from 139.59.41.154 port 35242
Aug 13 10:45:21 debian sshd\[27588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.41.154
...
2019-08-13 17:51:51
182.93.48.21 attackbots
Aug 13 08:33:47 yesfletchmain sshd\[30461\]: Invalid user password from 182.93.48.21 port 60798
Aug 13 08:33:47 yesfletchmain sshd\[30461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.48.21
Aug 13 08:33:49 yesfletchmain sshd\[30461\]: Failed password for invalid user password from 182.93.48.21 port 60798 ssh2
Aug 13 08:38:47 yesfletchmain sshd\[30520\]: Invalid user mm from 182.93.48.21 port 53078
Aug 13 08:38:47 yesfletchmain sshd\[30520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.93.48.21
...
2019-08-13 17:45:19
110.137.60.242 attack
Unauthorized connection attempt from IP address 110.137.60.242 on Port 445(SMB)
2019-08-13 17:42:02
194.8.128.12 attackspam
[portscan] Port scan
2019-08-13 18:34:28
213.87.133.186 attackbots
dmarc report from: Mail.Ru
[reports:1]
[domains:1]
scam dkim: sendgrid.info
2019-08-13 18:27:34
123.207.2.120 attack
2019-08-13T10:07:13.468944abusebot-2.cloudsearch.cf sshd\[11353\]: Invalid user andy from 123.207.2.120 port 38460
2019-08-13 18:28:12
202.129.29.135 attackbotsspam
Aug 13 10:56:33 debian sshd\[27856\]: Invalid user ts3server from 202.129.29.135 port 60081
Aug 13 10:56:33 debian sshd\[27856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.129.29.135
...
2019-08-13 18:03:28
45.78.5.60 attackbotsspam
detected by Fail2Ban
2019-08-13 18:25:57
212.64.127.151 attackbots
Aug 13 11:34:12 meumeu sshd[1118]: Failed password for invalid user henry from 212.64.127.151 port 58134 ssh2
Aug 13 11:37:40 meumeu sshd[1566]: Failed password for invalid user lucky from 212.64.127.151 port 57896 ssh2
Aug 13 11:41:06 meumeu sshd[2100]: Failed password for invalid user heike from 212.64.127.151 port 57656 ssh2
...
2019-08-13 17:53:30
187.190.235.43 attack
Aug 13 12:40:09 srv-4 sshd\[12158\]: Invalid user ubnt from 187.190.235.43
Aug 13 12:40:09 srv-4 sshd\[12158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.190.235.43
Aug 13 12:40:11 srv-4 sshd\[12158\]: Failed password for invalid user ubnt from 187.190.235.43 port 54713 ssh2
...
2019-08-13 18:38:46

Recently Reported IPs

140.116.168.70 140.116.115.190 140.116.214.1 140.116.229.56
140.116.41.227 140.116.181.243 140.113.134.159 129.236.217.169
140.116.216.110 211.76.247.73 168.30.145.42 140.116.190.210
122.129.122.122 139.179.206.152 140.116.113.47 120.114.241.122
140.113.158.48 140.135.163.58 120.118.189.1 149.201.240.119