Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.42.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.42.100.			IN	A

;; AUTHORITY SECTION:
.			39	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 14:47:07 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 100.42.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.42.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.197.233.197 attack
ssh brute force
2020-05-21 17:12:36
162.247.72.199 attackbotsspam
$f2bV_matches
2020-05-21 17:49:06
5.182.210.228 attack
Automatic report - XMLRPC Attack
2020-05-21 17:47:54
187.72.160.39 attackspam
Dovecot Invalid User Login Attempt.
2020-05-21 17:49:59
189.4.151.102 attack
May 21 14:19:28 dhoomketu sshd[83507]: Invalid user ywt from 189.4.151.102 port 49262
May 21 14:19:28 dhoomketu sshd[83507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.151.102 
May 21 14:19:28 dhoomketu sshd[83507]: Invalid user ywt from 189.4.151.102 port 49262
May 21 14:19:31 dhoomketu sshd[83507]: Failed password for invalid user ywt from 189.4.151.102 port 49262 ssh2
May 21 14:24:01 dhoomketu sshd[83567]: Invalid user qki from 189.4.151.102 port 52962
...
2020-05-21 17:19:43
183.89.211.166 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-05-21 17:11:48
64.37.61.154 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-05-21 17:19:59
51.91.100.109 attack
Invalid user vrs from 51.91.100.109 port 55986
2020-05-21 17:25:08
142.93.154.174 attack
$f2bV_matches
2020-05-21 17:44:38
112.85.42.229 attackbotsspam
May 21 11:08:26 home sshd[25006]: Failed password for root from 112.85.42.229 port 15300 ssh2
May 21 11:08:28 home sshd[25006]: Failed password for root from 112.85.42.229 port 15300 ssh2
May 21 11:08:30 home sshd[25006]: Failed password for root from 112.85.42.229 port 15300 ssh2
...
2020-05-21 17:22:27
185.220.100.249 attack
May 21 03:51:41 ssh2 sshd[97531]: User root from tor-exit-10.zbau.f3netze.de not allowed because not listed in AllowUsers
May 21 03:51:41 ssh2 sshd[97531]: Failed password for invalid user root from 185.220.100.249 port 32996 ssh2
May 21 03:51:42 ssh2 sshd[97531]: Failed password for invalid user root from 185.220.100.249 port 32996 ssh2
...
2020-05-21 17:24:00
37.139.20.6 attackbotsspam
Invalid user gov from 37.139.20.6 port 52997
2020-05-21 17:15:45
106.116.118.89 attackspambots
May 21 11:29:29 jane sshd[5790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.116.118.89 
May 21 11:29:31 jane sshd[5790]: Failed password for invalid user fdw from 106.116.118.89 port 35270 ssh2
...
2020-05-21 17:36:47
101.51.156.188 attackspam
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-05-21 17:40:45
69.30.211.2 attackbotsspam
20 attempts against mh-misbehave-ban on wood
2020-05-21 17:42:07

Recently Reported IPs

79.170.108.193 131.114.73.222 198.86.29.22 132.70.66.9
147.229.117.35 140.116.134.82 140.125.218.44 87.246.218.79
140.116.154.157 129.78.64.1 145.33.103.37 140.116.162.8
140.116.61.228 140.116.89.168 140.120.90.6 140.113.40.197
140.116.179.157 144.122.121.124 140.116.112.19 149.169.86.222