Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.60.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26045
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.60.168.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 04 18:11:08 CST 2023
;; MSG SIZE  rcvd: 107
Host info
168.60.116.140.in-addr.arpa domain name pointer pc-60-168.hosp.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.60.116.140.in-addr.arpa	name = pc-60-168.hosp.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.20.64.42 attackbots
400 BAD REQUEST
2020-09-16 14:39:46
120.52.93.50 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-09-16 15:36:53
122.51.27.69 attackbotsspam
Sep 16 09:08:11 prox sshd[8310]: Failed password for root from 122.51.27.69 port 49782 ssh2
2020-09-16 15:31:56
49.232.144.7 attackspam
fail2ban -- 49.232.144.7
...
2020-09-16 14:35:13
98.146.212.146 attackbotsspam
$f2bV_matches
2020-09-16 15:32:14
94.25.182.114 attackbotsspam
1600189176 - 09/15/2020 18:59:36 Host: 94.25.182.114/94.25.182.114 Port: 445 TCP Blocked
2020-09-16 15:39:20
106.13.47.6 attackbots
ssh brute force
2020-09-16 14:33:55
117.161.11.93 attackspambots
Unauthorized connection attempt from IP address 117.161.11.93 on Port 3389(RDP)
2020-09-16 14:35:52
185.202.1.124 attackbots
2020-09-16T02:27:59Z - RDP login failed multiple times. (185.202.1.124)
2020-09-16 14:50:11
200.116.175.40 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-16 15:26:05
156.54.164.97 attackspambots
Sep 16 08:12:00 nuernberg-4g-01 sshd[16726]: Failed password for root from 156.54.164.97 port 50031 ssh2
Sep 16 08:15:48 nuernberg-4g-01 sshd[17951]: Failed password for root from 156.54.164.97 port 55448 ssh2
2020-09-16 14:37:14
178.62.230.153 attack
SSH Brute Force
2020-09-16 14:44:21
91.250.242.12 attackspam
port scan and connect, tcp 22 (ssh)
2020-09-16 15:39:54
13.125.115.202 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-09-16 15:29:59
190.144.139.76 attack
leo_www
2020-09-16 15:21:53

Recently Reported IPs

194.27.50.136 140.116.66.155 140.116.193.17 145.90.86.187
158.75.24.212 115.178.222.37 168.90.77.177 83.212.101.206
120.105.20.5 139.179.202.153 158.195.196.234 140.116.187.189
210.72.8.212 216.58.209.174 140.116.40.123 139.198.13.24
120.105.145.162 128.163.232.67 188.172.245.22 129.234.189.214