Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.52.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.52.75.			IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050100 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 21:25:35 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 75.52.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.52.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.34.91.2 attack
Oct 13 06:36:11 markkoudstaal sshd[3521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.91.2
Oct 13 06:36:13 markkoudstaal sshd[3521]: Failed password for invalid user pazdera from 117.34.91.2 port 52312 ssh2
Oct 13 06:41:42 markkoudstaal sshd[5098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.91.2
...
2020-10-13 12:47:04
185.253.152.73 attackspambots
Oct 13 06:25:25 [host] sshd[11308]: Invalid user n
Oct 13 06:25:25 [host] sshd[11308]: pam_unix(sshd:
Oct 13 06:25:28 [host] sshd[11308]: Failed passwor
2020-10-13 12:33:54
87.251.77.206 attack
Invalid user user from 87.251.77.206 port 60828
2020-10-13 13:06:05
161.35.174.168 attackspam
Oct 12 17:36:20 ny01 sshd[29909]: Failed password for root from 161.35.174.168 port 43314 ssh2
Oct 12 17:39:46 ny01 sshd[30348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.174.168
Oct 12 17:39:49 ny01 sshd[30348]: Failed password for invalid user ruiz from 161.35.174.168 port 40314 ssh2
2020-10-13 12:48:20
178.210.49.100 attackspambots
1602535797 - 10/12/2020 22:49:57 Host: 178.210.49.100/178.210.49.100 Port: 445 TCP Blocked
...
2020-10-13 12:44:52
190.137.230.166 attackbotsspam
(sshd) Failed SSH login from 190.137.230.166 (AR/Argentina/host166.190-137-230.telecom.net.ar): 5 in the last 3600 secs
2020-10-13 12:46:35
89.248.168.157 attack
firewall-block, port(s): 2551/tcp
2020-10-13 13:05:44
82.208.65.46 attackbots
SS5,Magento Bruteforce Login Attack POST /index.php/admin/
2020-10-13 12:39:37
182.75.139.26 attack
SSH login attempts.
2020-10-13 12:34:18
165.232.32.126 attackbotsspam
Automatic report - Banned IP Access
2020-10-13 13:03:36
195.144.205.25 attackspambots
$f2bV_matches
2020-10-13 12:32:25
121.46.26.126 attack
sshd jail - ssh hack attempt
2020-10-13 12:53:23
37.187.3.53 attackspam
SSH Brute Force
2020-10-13 12:29:57
35.238.6.69 attackbotsspam
Invalid user test from 35.238.6.69 port 48062
2020-10-13 13:02:46
51.77.63.162 attackbotsspam
Agressive Lottery SPAM
2020-10-13 13:10:11

Recently Reported IPs

140.116.151.83 195.178.144.146 115.178.207.174 140.116.53.105
87.246.255.234 115.178.202.129 116.206.15.23 140.125.86.231
128.61.244.254 140.116.140.34 140.116.110.146 146.83.131.230
35.185.182.37 140.116.111.135 140.116.33.93 74.117.137.11
140.116.20.16 140.116.182.160 115.178.235.75 115.178.206.7