Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.81.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.81.86.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:01:12 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 86.81.116.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 86.81.116.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
122.51.198.248 attackbotsspam
2020-03-01T21:57:59.342438linuxbox-skyline sshd[83811]: Invalid user vnc from 122.51.198.248 port 44150
...
2020-03-02 13:54:37
194.26.29.114 attackbotsspam
03/02/2020-00:05:09.197472 194.26.29.114 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-02 13:48:17
117.239.238.70 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-02 13:43:20
36.232.52.99 attackbots
1583125071 - 03/02/2020 05:57:51 Host: 36.232.52.99/36.232.52.99 Port: 445 TCP Blocked
2020-03-02 13:59:51
222.186.52.139 attackbotsspam
Mar  2 06:40:51 MK-Soft-VM3 sshd[24795]: Failed password for root from 222.186.52.139 port 41175 ssh2
Mar  2 06:40:55 MK-Soft-VM3 sshd[24795]: Failed password for root from 222.186.52.139 port 41175 ssh2
...
2020-03-02 13:44:12
116.110.170.30 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-02 13:49:10
110.80.17.26 attackbotsspam
Mar  2 06:38:36 lnxded63 sshd[2608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26
2020-03-02 13:42:13
218.161.5.19 attackbotsspam
Unauthorized connection attempt detected from IP address 218.161.5.19 to port 81 [J]
2020-03-02 14:15:43
124.156.211.137 attack
Unauthorized connection attempt detected from IP address 124.156.211.137 to port 523 [J]
2020-03-02 14:04:50
152.136.121.186 attack
Unauthorized connection attempt detected from IP address 152.136.121.186 to port 8080 [J]
2020-03-02 14:26:05
187.195.189.4 attack
Unauthorized connection attempt detected from IP address 187.195.189.4 to port 81 [J]
2020-03-02 14:19:58
14.42.248.118 attackspambots
Unauthorized connection attempt detected from IP address 14.42.248.118 to port 5555 [J]
2020-03-02 14:12:01
203.174.88.201 attackbots
Unauthorised access (Mar  2) SRC=203.174.88.201 LEN=40 TTL=50 ID=52459 TCP DPT=23 WINDOW=37909 SYN
2020-03-02 13:57:32
58.82.192.215 attackbotsspam
Unauthorized connection attempt detected from IP address 58.82.192.215 to port 1433 [J]
2020-03-02 14:10:27
181.114.135.83 attack
Unauthorized connection attempt detected from IP address 181.114.135.83 to port 80 [J]
2020-03-02 14:21:51

Recently Reported IPs

141.34.32.149 140.123.85.52 158.49.40.100 140.116.196.81
120.114.241.35 140.116.113.165 140.116.63.116 140.116.235.100
140.123.29.31 140.116.132.98 177.200.12.100 164.107.112.76
140.130.12.39 138.232.1.4 140.116.219.141 202.28.197.38
140.116.117.219 140.115.184.172 140.116.98.152 140.116.15.204