Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.49.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.49.220.			IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050501 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 06 08:55:39 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 220.49.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.49.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.161.74.100 attack
2020-05-21T10:41:58.675918randservbullet-proofcloud-66.localdomain sshd[19504]: Invalid user olq from 111.161.74.100 port 41989
2020-05-21T10:41:58.680963randservbullet-proofcloud-66.localdomain sshd[19504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.161.74.100
2020-05-21T10:41:58.675918randservbullet-proofcloud-66.localdomain sshd[19504]: Invalid user olq from 111.161.74.100 port 41989
2020-05-21T10:42:00.516255randservbullet-proofcloud-66.localdomain sshd[19504]: Failed password for invalid user olq from 111.161.74.100 port 41989 ssh2
...
2020-05-21 18:57:46
45.162.4.175 attackspambots
Invalid user rra from 45.162.4.175 port 37330
2020-05-21 18:46:41
88.22.118.244 attackbots
odoo8
...
2020-05-21 18:47:25
51.104.40.176 attack
May 21 09:20:59 haigwepa sshd[29000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.104.40.176 
May 21 09:21:01 haigwepa sshd[29000]: Failed password for invalid user thh from 51.104.40.176 port 39638 ssh2
...
2020-05-21 19:19:52
129.226.63.184 attackspam
$f2bV_matches
2020-05-21 18:47:10
49.235.46.18 attack
Invalid user wxt from 49.235.46.18 port 54740
2020-05-21 18:44:43
142.93.162.84 attackspambots
$f2bV_matches
2020-05-21 18:49:24
51.91.110.51 attackspambots
May 21 11:24:50 l03 sshd[9717]: Invalid user wez from 51.91.110.51 port 41798
...
2020-05-21 18:42:37
87.226.165.143 attackspambots
3x Failed Password
2020-05-21 18:40:56
37.49.226.236 attackbots
Automatic report - Banned IP Access
2020-05-21 19:15:04
51.75.78.128 attackspambots
5x Failed Password
2020-05-21 19:22:17
40.117.41.106 attackspam
May 21 09:19:56 localhost sshd\[18409\]: Invalid user avp from 40.117.41.106 port 15909
May 21 09:19:56 localhost sshd\[18409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.41.106
May 21 09:19:58 localhost sshd\[18409\]: Failed password for invalid user avp from 40.117.41.106 port 15909 ssh2
...
2020-05-21 19:20:20
27.254.137.144 attackbotsspam
Brute-force attempt banned
2020-05-21 18:57:21
85.105.74.192 attack
Automatic report - Port Scan Attack
2020-05-21 18:59:09
75.90.140.206 attackspambots
20/5/20@23:49:18: FAIL: Alarm-Network address from=75.90.140.206
20/5/20@23:49:18: FAIL: Alarm-Network address from=75.90.140.206
...
2020-05-21 19:14:13

Recently Reported IPs

134.53.247.248 140.116.116.126 160.94.65.189 140.116.236.39
140.116.20.13 140.116.112.3 115.178.251.119 140.116.24.67
115.178.254.2 140.116.17.205 140.116.233.55 140.116.118.172
140.116.237.151 115.178.251.249 10.6.78.132 202.70.54.96
140.116.39.207 140.116.39.86 140.116.220.129 61.56.3.216