Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.72.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.72.59.			IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:39:16 CST 2023
;; MSG SIZE  rcvd: 106
Host info
59.72.116.140.in-addr.arpa domain name pointer lime.ee.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.72.116.140.in-addr.arpa	name = lime.ee.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.59.45.55 normal
До
2020-04-12 07:02:30
111.229.128.136 attack
Apr 11 22:49:33 sso sshd[19093]: Failed password for root from 111.229.128.136 port 57344 ssh2
...
2020-04-12 07:14:18
108.5.106.131 attack
SSH bruteforce
2020-04-12 07:39:13
180.76.134.238 attackspam
IP blocked
2020-04-12 07:33:54
116.105.216.179 attackspam
Apr 12 01:15:34 OPSO sshd\[8610\]: Invalid user user from 116.105.216.179 port 60652
Apr 12 01:15:35 OPSO sshd\[8610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.216.179
Apr 12 01:15:37 OPSO sshd\[8610\]: Failed password for invalid user user from 116.105.216.179 port 60652 ssh2
Apr 12 01:15:53 OPSO sshd\[8681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.216.179  user=root
Apr 12 01:15:53 OPSO sshd\[8684\]: Invalid user user from 116.105.216.179 port 28458
2020-04-12 07:19:34
124.88.37.161 attackbotsspam
SSH Invalid Login
2020-04-12 07:18:16
62.234.100.242 attackbotsspam
Invalid user gts from 62.234.100.242 port 54976
2020-04-12 07:22:36
118.24.9.152 attack
Apr 11 23:55:06 mout sshd[6682]: Connection closed by 118.24.9.152 port 53276 [preauth]
2020-04-12 07:24:04
175.155.13.34 attackspam
Apr 11 23:41:11 pve sshd[21692]: Failed password for root from 175.155.13.34 port 55998 ssh2
Apr 11 23:42:19 pve sshd[22634]: Failed password for root from 175.155.13.34 port 44314 ssh2
2020-04-12 07:07:15
174.194.26.63 spambotsattackproxynormal
Sent attack
2020-04-12 07:38:50
134.209.250.9 attackspambots
Invalid user postgres from 134.209.250.9 port 49496
2020-04-12 07:28:56
118.69.128.144 attackspambots
Honeypot Attack, Port 23
2020-04-12 07:09:09
191.55.50.179 attackspambots
Apr 11 22:54:15 piServer sshd[31251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.50.179 
Apr 11 22:54:17 piServer sshd[31251]: Failed password for invalid user admin from 191.55.50.179 port 58663 ssh2
Apr 11 22:54:23 piServer sshd[31271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.55.50.179 
...
2020-04-12 07:16:44
106.12.89.154 attackbotsspam
Invalid user test from 106.12.89.154 port 36712
2020-04-12 07:03:56
107.173.246.219 attackspam
(From elliott.jonsson@gmail.com) If you’ve been online any amount of time, you’re most likely still struggling to make the money you want online…

Am I right?

Well, we’re confident to say that you’ve come to the right place.

You might be thinking… Why are we different from the thousands of so-called “expert marketers” out there?

For one, I have the power to read your mind. I know exactly why you’re struggling right now...

OK - maybe reading your mind is a bit far fetched.

But what I can tell you is this…

We’ve worked with over 45,000+ customers.

And if they were struggling, we noticed it always came down to ONE important factor…

=>> http://bit.ly/UnlTraffic

You don't need to work for anyone else.

You don't need to take orders from your boss.

And you don't need to take permission to take vacation or spend a day with family.

And this is not just talk, let me show you real PROOF…

=>> http://bit.ly/UnlTraffic

Cheers
2020-04-12 07:15:39

Recently Reported IPs

133.243.238.164 140.114.78.125 140.116.52.124 163.15.164.130
140.116.241.66 52.53.197.19 146.6.100.132 203.64.128.222
147.46.240.18 194.146.106.10 140.117.49.217 139.153.15.5
163.17.13.36 140.116.40.239 194.146.106.106 140.116.49.222
210.45.114.162 140.131.14.83 129.132.105.60 140.116.71.102