Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.61.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.61.152.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:28:56 CST 2023
;; MSG SIZE  rcvd: 107
Host info
152.61.116.140.in-addr.arpa domain name pointer pc-61-152.hosp.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
152.61.116.140.in-addr.arpa	name = pc-61-152.hosp.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.141.5.199 attack
ssh failed login
2019-10-16 06:47:53
103.28.57.86 attackbots
Oct 15 23:37:54 jane sshd[16149]: Failed password for root from 103.28.57.86 port 64119 ssh2
...
2019-10-16 06:41:57
45.83.66.67 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-10-16 06:14:33
119.86.83.102 attack
23/tcp 60001/tcp
[2019-10-15]2pkt
2019-10-16 06:42:11
132.232.132.103 attack
Oct 16 00:15:24 [host] sshd[7646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
Oct 16 00:15:26 [host] sshd[7646]: Failed password for root from 132.232.132.103 port 47112 ssh2
Oct 16 00:19:38 [host] sshd[7907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103  user=root
2019-10-16 06:44:02
120.52.152.18 attackbotsspam
15.10.2019 22:44:32 Connection to port 2152 blocked by firewall
2019-10-16 06:47:35
36.111.171.108 attackspambots
Oct 15 09:52:33 wbs sshd\[20928\]: Invalid user con8080 from 36.111.171.108
Oct 15 09:52:33 wbs sshd\[20928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.171.108
Oct 15 09:52:35 wbs sshd\[20928\]: Failed password for invalid user con8080 from 36.111.171.108 port 34058 ssh2
Oct 15 09:56:34 wbs sshd\[21284\]: Invalid user NETnet from 36.111.171.108
Oct 15 09:56:34 wbs sshd\[21284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.171.108
2019-10-16 06:16:10
45.80.64.127 attackbotsspam
fraudulent SSH attempt
2019-10-16 06:49:18
51.38.152.200 attack
Oct 16 01:17:28 sauna sshd[222887]: Failed password for root from 51.38.152.200 port 45842 ssh2
...
2019-10-16 06:33:43
219.149.108.195 attack
Oct 15 21:46:15 mail sshd[25482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195  user=root
Oct 15 21:46:17 mail sshd[25482]: Failed password for root from 219.149.108.195 port 60877 ssh2
Oct 15 21:51:34 mail sshd[26044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195  user=root
Oct 15 21:51:37 mail sshd[26044]: Failed password for root from 219.149.108.195 port 50335 ssh2
Oct 15 21:55:43 mail sshd[26547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.149.108.195  user=root
Oct 15 21:55:45 mail sshd[26547]: Failed password for root from 219.149.108.195 port 5272 ssh2
...
2019-10-16 06:47:20
182.61.55.239 attack
2019-10-15T22:07:29.376991shield sshd\[8529\]: Invalid user testtest from 182.61.55.239 port 58024
2019-10-15T22:07:29.381259shield sshd\[8529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.239
2019-10-15T22:07:30.991435shield sshd\[8529\]: Failed password for invalid user testtest from 182.61.55.239 port 58024 ssh2
2019-10-15T22:11:23.253654shield sshd\[9394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.55.239  user=root
2019-10-15T22:11:25.320640shield sshd\[9394\]: Failed password for root from 182.61.55.239 port 38797 ssh2
2019-10-16 06:15:19
150.129.34.108 attackspambots
19/10/15@15:56:35: FAIL: Alarm-Intrusion address from=150.129.34.108
...
2019-10-16 06:14:05
124.156.50.96 attackspam
" "
2019-10-16 06:24:32
85.209.42.186 attack
1433/tcp 445/tcp
[2019-09-15/10-15]2pkt
2019-10-16 06:45:17
195.154.207.199 attackbotsspam
SSH Brute-Forcing (ownc)
2019-10-16 06:14:55

Recently Reported IPs

159.226.36.57 121.187.71.109 194.80.232.23 140.116.228.154
140.116.94.227 147.188.245.110 140.116.47.129 140.116.72.236
140.116.94.71 46.239.142.36 140.116.193.109 140.116.86.232
103.86.131.115 128.112.202.52 140.116.16.231 140.116.25.121
140.116.8.137 140.116.241.58 41.93.43.2 203.176.179.180