Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
140.116.54.34 attackbots
Mar 24 16:57:39 ns382633 sshd\[6182\]: Invalid user pi from 140.116.54.34 port 50608
Mar 24 16:57:39 ns382633 sshd\[6183\]: Invalid user pi from 140.116.54.34 port 50610
Mar 24 16:57:39 ns382633 sshd\[6182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.116.54.34
Mar 24 16:57:39 ns382633 sshd\[6183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.116.54.34
Mar 24 16:57:42 ns382633 sshd\[6182\]: Failed password for invalid user pi from 140.116.54.34 port 50608 ssh2
Mar 24 16:57:42 ns382633 sshd\[6183\]: Failed password for invalid user pi from 140.116.54.34 port 50610 ssh2
2020-03-25 00:42:29
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.54.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.54.245.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:23:00 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 245.54.116.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 245.54.116.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
198.235.24.127 attackproxy
SSH bot
2024-05-12 23:53:06
88.135.80.50 botsattackproxy
88.135.80.50
2024-05-09 19:36:21
43.157.82.72 botsattackproxy
SSH bot
2024-05-23 12:56:16
182.48.174.168 spambotsattackproxynormal
I
2024-05-11 05:32:57
71.6.146.130 attackproxy
Botnet DB Scanner
2024-05-20 13:03:10
104.156.155.3 attackproxy
Vulnerability Scanner
2024-05-08 12:42:48
23.225.121.74 proxynormal
正常
2024-05-18 01:04:01
217.113.194.66 spamattackproxy
Bad IP: PHP Forum Spammer
2024-05-16 15:36:31
64.62.197.190 attackproxy
Vulnerability Scanner
2024-05-16 12:49:45
79.173.88.109 attack
Fraud connect
2024-05-18 13:26:19
66.150.8.90 attackproxy
Brute-force attacker IP
2024-05-10 14:50:18
1.0.190.194 spam
Присоединяйтесь к группам объявлений России!

Частные объявления всегда были и будут бесплатными.

Соблюдайте правила групп, чтобы размещать Ваши объявления
Присоединяйся на свой город, чтобы не потерять!

Группы объявлений в телеграм
2024-05-08 15:05:44
37.112.204.183 attack
Bad IP
2024-05-20 14:34:15
90.151.171.106 attack
Vulnerability Scanner
2024-05-14 00:20:49
64.62.197.90 attackproxy
Brute-force attacker IP (retention 30 days)
2024-05-17 15:49:47

Recently Reported IPs

180.214.233.84 140.116.163.218 139.91.197.100 140.116.182.150
140.116.54.155 120.105.145.200 140.116.155.62 79.88.50.78
140.116.86.60 124.16.189.81 105.154.76.229 140.116.1.135
202.124.205.7 195.130.110.13 202.173.11.239 140.116.97.54
167.205.253.6 140.110.223.221 136.159.2.16 140.116.214.243