Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kaohsiung

Region: Kaohsiung

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.70.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.70.130.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051500 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 15 16:15:27 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 130.70.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.70.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.68.190.223 attack
Oct 22 12:58:32 MK-Soft-VM5 sshd[31827]: Failed password for root from 51.68.190.223 port 39686 ssh2
...
2019-10-22 19:05:39
35.245.178.249 attackbots
$f2bV_matches
2019-10-22 19:12:30
88.81.72.240 attack
$f2bV_matches
2019-10-22 19:20:08
102.165.33.87 attackbotsspam
UTC: 2019-10-21 port: 22/tcp
2019-10-22 19:20:30
13.125.166.219 attack
$f2bV_matches
2019-10-22 19:14:43
36.237.7.92 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:06:53
154.66.252.146 attackspambots
Brute force attempt
2019-10-22 19:42:13
121.13.237.34 attack
Time:     Tue Oct 22 07:47:17 2019 -0300
IP:       121.13.237.34 (CN/China/-)
Failures: 15 (ftpd)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-10-22 19:27:17
142.93.26.245 attackspam
Oct 22 13:16:44 cp sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
2019-10-22 19:41:56
191.5.215.164 attackspambots
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:15:00
182.50.130.72 attackspam
Automatic report - XMLRPC Attack
2019-10-22 19:01:39
180.2.115.181 attack
$f2bV_matches
2019-10-22 19:07:17
185.176.27.242 attackspambots
Oct 22 13:02:41 mc1 kernel: \[3028512.330131\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=8322 PROTO=TCP SPT=47834 DPT=64482 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 22 13:04:08 mc1 kernel: \[3028598.807249\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=610 PROTO=TCP SPT=47834 DPT=63904 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 22 13:08:42 mc1 kernel: \[3028872.941982\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6724 PROTO=TCP SPT=47834 DPT=28385 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-22 19:12:02
119.191.221.230 attackspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 19:23:07
176.99.110.224 attackspam
$f2bV_matches
2019-10-22 19:14:15

Recently Reported IPs

140.116.92.232 116.206.15.1 202.90.133.67 140.116.57.137
147.210.245.181 133.8.132.25 149.169.81.17 202.127.23.153
140.116.57.128 159.226.73.9 10.7.65.98 131.156.156.31
152.3.68.155 140.116.73.102 193.219.176.69 140.116.8.8
114.142.173.1 193.145.124.20 120.110.67.6 143.107.253.3