Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.7.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9727
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.7.212.			IN	A

;; AUTHORITY SECTION:
.			135	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:23:06 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 212.7.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.7.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.165.225.35 attack
Honeypot attack, port: 445, PTR: abts-tn-static-035.225.165.122.airtelbroadband.in.
2019-10-31 14:53:47
151.80.4.248 attackbots
Oct 30 02:30:41 collab sshd[18672]: Did not receive identification string from 151.80.4.248
Oct 30 02:33:51 collab sshd[18789]: Invalid user a from 151.80.4.248
Oct 30 02:33:53 collab sshd[18789]: Failed password for invalid user a from 151.80.4.248 port 46072 ssh2
Oct 30 02:33:53 collab sshd[18789]: Received disconnect from 151.80.4.248: 11: Normal Shutdown, Thank you for playing [preauth]
Oct 30 02:34:34 collab sshd[18837]: Failed password for r.r from 151.80.4.248 port 46928 ssh2
Oct 30 02:34:34 collab sshd[18837]: Received disconnect from 151.80.4.248: 11: Normal Shutdown, Thank you for playing [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=151.80.4.248
2019-10-31 14:47:34
188.142.209.49 attackspambots
Oct 31 00:47:05 ny01 sshd[8838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.142.209.49
Oct 31 00:47:07 ny01 sshd[8838]: Failed password for invalid user hy6ju7 from 188.142.209.49 port 56198 ssh2
Oct 31 00:53:54 ny01 sshd[9475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.142.209.49
2019-10-31 14:45:43
43.254.16.253 attackspambots
X-DKIM-Failure: bodyhash_mismatch
Received: from mg1.eee.tw ([43.254.16.253])
	by mx145.antispamcloud.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256)
	(Exim 4.89)
	(envelope-from )
	id 1iQ0zJ-000QIH-8l
	for as@silk.com.sg; Thu, 31 Oct 2019 04:19:06 +0100
Received: from re34.cx901.com (re34.cx901.com [43.254.17.20])
	(using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mg1.eee.tw (Postfix) with ESMTPS id 3BA13E010FE;
	Thu, 31 Oct 2019 11:18:41 +0800 (CST)
DKIM-Filter: OpenDKIM Filter v2.11.0 mg1.eee.tw 3BA13E010FE
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mg1.eee.tw;
	s=default; t=1572491921;
	bh=Nb0ZTMwsuXuBamK9CzRsFxbYzgl+iGvOm/ghvaZXHcQ=;
	h=Date:From:To:Subject:In-Reply-To:References:From;
	b=I11pp27PCr4ojkzUDKb3AxhIOo089d9NZke26JyttI0OcPMz2APst88MyPLK0dWfQ
	 PnTUCsudXSJgQ3sLdIkrC58HOyY6FCAFcAVsYI3C4llrd1Hm45+7jhSXxegiIBiJbQ
	 clMJrycCq+3VDX8eR0KqPqajNVuRLwqiabKy8JLY=
2019-10-31 15:00:30
185.175.25.52 attackbots
detected by Fail2Ban
2019-10-31 14:53:28
92.4.179.217 attack
" "
2019-10-31 14:58:59
221.120.236.50 attackspam
Oct 31 05:29:20 venus sshd\[2184\]: Invalid user admin from 221.120.236.50 port 28189
Oct 31 05:29:20 venus sshd\[2184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.236.50
Oct 31 05:29:22 venus sshd\[2184\]: Failed password for invalid user admin from 221.120.236.50 port 28189 ssh2
...
2019-10-31 15:03:01
190.85.171.126 attack
Invalid user veronica from 190.85.171.126 port 54008
2019-10-31 14:55:40
61.180.94.131 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/61.180.94.131/ 
 
 CN - 1H : (695)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 61.180.94.131 
 
 CIDR : 61.180.0.0/17 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 14 
  3H - 41 
  6H - 88 
 12H - 161 
 24H - 304 
 
 DateTime : 2019-10-31 04:52:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-31 14:47:10
193.188.22.188 attackspambots
2019-10-31T07:27:32.182880lon01.zurich-datacenter.net sshd\[6172\]: Invalid user admin from 193.188.22.188 port 27197
2019-10-31T07:27:32.199212lon01.zurich-datacenter.net sshd\[6172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188
2019-10-31T07:27:33.591845lon01.zurich-datacenter.net sshd\[6172\]: Failed password for invalid user admin from 193.188.22.188 port 27197 ssh2
2019-10-31T07:27:33.732476lon01.zurich-datacenter.net sshd\[6174\]: Invalid user developer from 193.188.22.188 port 29191
2019-10-31T07:27:33.744846lon01.zurich-datacenter.net sshd\[6174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.188
...
2019-10-31 14:40:22
190.248.67.123 attackspam
2019-10-31T06:34:52.127130abusebot-7.cloudsearch.cf sshd\[19228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.248.67.123  user=root
2019-10-31 14:38:54
212.68.208.120 attack
Invalid user user1 from 212.68.208.120 port 54338
2019-10-31 15:13:14
171.221.203.185 attack
$f2bV_matches
2019-10-31 14:42:38
138.118.214.71 attackspambots
Oct 31 07:19:56 ArkNodeAT sshd\[10336\]: Invalid user graciosa from 138.118.214.71
Oct 31 07:19:56 ArkNodeAT sshd\[10336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.118.214.71
Oct 31 07:19:58 ArkNodeAT sshd\[10336\]: Failed password for invalid user graciosa from 138.118.214.71 port 37608 ssh2
2019-10-31 14:43:51
94.21.243.204 attackbots
Oct 31 08:04:30 MK-Soft-Root2 sshd[17248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.21.243.204 
Oct 31 08:04:32 MK-Soft-Root2 sshd[17248]: Failed password for invalid user @system from 94.21.243.204 port 50906 ssh2
...
2019-10-31 15:10:31

Recently Reported IPs

61.61.247.49 194.66.35.42 140.116.157.29 10.7.60.225
140.116.64.175 202.29.145.49 140.116.131.101 140.116.194.108
131.159.66.70 14.139.125.192 10.3.202.92 140.116.123.65
184.171.92.30 140.116.84.95 195.246.54.228 219.192.23.46
200.145.46.133 128.197.41.108 140.128.20.177 128.139.6.66