Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.59.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.59.193.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 14 15:12:13 CST 2023
;; MSG SIZE  rcvd: 107
Host info
193.59.116.140.in-addr.arpa domain name pointer pc-59-193.hosp.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
193.59.116.140.in-addr.arpa	name = pc-59-193.hosp.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
110.54.232.151 attackbotsspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-09-29 13:38:55
122.51.41.109 attack
Invalid user big from 122.51.41.109 port 35824
2020-09-29 13:59:33
45.87.220.76 attackspambots
received phishing
2020-09-29 13:49:50
186.22.238.134 attack
Sep 28 22:39:32 mellenthin postfix/smtpd[8520]: NOQUEUE: reject: RCPT from unknown[186.22.238.134]: 554 5.7.1 Service unavailable; Client host [186.22.238.134] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/186.22.238.134; from= to= proto=ESMTP helo=
2020-09-29 13:52:01
119.123.177.156 attackbotsspam
SSH auth scanning - multiple failed logins
2020-09-29 13:51:10
124.193.218.66 attack
 TCP (SYN) 124.193.218.66:43669 -> port 1433, len 40
2020-09-29 13:35:16
186.96.102.198 attack
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "adriana" at 2020-09-29T05:27:06Z
2020-09-29 13:40:27
93.115.230.97 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-29 14:10:52
197.5.145.93 attackspam
Brute-force attempt banned
2020-09-29 13:57:53
167.114.103.140 attackspambots
$f2bV_matches
2020-09-29 14:17:22
218.237.253.167 attackspam
Invalid user cert from 218.237.253.167 port 47146
2020-09-29 13:53:49
176.106.162.202 attack
port 23
2020-09-29 14:14:33
211.80.102.189 attackbots
$f2bV_matches
2020-09-29 13:46:39
156.54.169.159 attack
sshguard
2020-09-29 14:09:13
68.183.66.107 attackspambots
Sep 28 21:37:39 XXXXXX sshd[33322]: Invalid user deployer from 68.183.66.107 port 50654
2020-09-29 13:56:15

Recently Reported IPs

140.116.106.38 120.105.145.179 140.116.40.240 194.83.36.203
120.114.114.70 140.123.217.173 202.12.97.148 145.116.158.250
124.16.189.96 158.49.42.95 140.116.154.135 148.88.245.216
140.116.67.28 193.224.158.44 177.36.80.9 149.169.144.200
14.139.45.242 140.116.110.80 155.43.76.6 134.169.108.250