Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
140.116.246.217 attack
'IP reached maximum auth failures for a one day block'
2020-03-18 00:26:13
140.116.246.217 attackspam
'IP reached maximum auth failures for a one day block'
2020-03-09 19:14:09
140.116.246.217 attackbots
'IP reached maximum auth failures for a one day block'
2020-02-14 13:36:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.246.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5725
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.246.141.		IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 16:58:25 CST 2023
;; MSG SIZE  rcvd: 108
Host info
141.246.116.140.in-addr.arpa domain name pointer office1.csie.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.246.116.140.in-addr.arpa	name = office1.csie.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.43.208.240 attackbots
firewall-block, port(s): 3390/tcp
2019-12-30 18:07:41
138.197.221.114 attackspam
Triggered by Fail2Ban at Vostok web server
2019-12-30 18:00:24
179.185.123.183 attackspam
Dec 30 08:45:19 www_kotimaassa_fi sshd[16636]: Failed password for root from 179.185.123.183 port 36728 ssh2
...
2019-12-30 17:38:25
167.99.203.202 attack
" "
2019-12-30 17:58:26
139.255.174.85 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-30 17:39:30
113.1.40.16 attackbots
Scanning
2019-12-30 18:01:36
189.213.31.176 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-30 18:09:20
106.12.210.144 attackbots
Dec 30 06:57:48 zeus sshd[19997]: Failed password for mysql from 106.12.210.144 port 37976 ssh2
Dec 30 07:01:26 zeus sshd[20125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.144 
Dec 30 07:01:28 zeus sshd[20125]: Failed password for invalid user dbus from 106.12.210.144 port 34770 ssh2
2019-12-30 17:56:56
182.191.113.14 attackspam
Dec 30 08:27:02 XXX sshd[7946]: Invalid user msfadmin from 182.191.113.14 port 25458
2019-12-30 17:55:41
218.92.0.212 attack
19/12/30@04:55:56: FAIL: Alarm-SSH address from=218.92.0.212
...
2019-12-30 17:57:40
111.177.32.83 attack
SSH auth scanning - multiple failed logins
2019-12-30 18:13:40
192.162.68.244 attackspambots
192.162.68.244 - - [30/Dec/2019:09:15:11 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 6040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.162.68.244 - - [30/Dec/2019:09:15:13 +0000] "POST /wp/wp-login.php HTTP/1.1" 200 5770 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-30 18:05:16
58.152.133.178 attackbotsspam
" "
2019-12-30 18:03:02
194.153.189.98 attackbots
3389BruteforceFW22
2019-12-30 17:54:39
187.94.134.30 attackbotsspam
Dec 30 06:26:00 IngegnereFirenze sshd[7726]: Failed password for invalid user admin from 187.94.134.30 port 49293 ssh2
...
2019-12-30 18:07:15

Recently Reported IPs

202.67.40.160 128.125.148.12 140.116.25.197 132.227.60.2
140.116.56.41 115.178.236.108 140.116.130.66 140.116.60.224
138.16.115.93 120.110.21.244 128.114.255.206 140.116.50.44
140.116.110.182 140.116.113.151 140.113.140.68 84.88.49.89
140.113.146.38 177.85.4.90 140.116.155.182 150.254.126.249