Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.85.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8534
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.85.84.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:45:12 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 84.85.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 84.85.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.97.7.65 attack
[portscan] Port scan
2019-07-15 19:54:42
111.122.211.94 attack
3389BruteforceFW21
2019-07-15 19:17:30
109.202.25.225 attackspam
Jul 15 13:25:54 legacy sshd[817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.202.25.225
Jul 15 13:25:56 legacy sshd[817]: Failed password for invalid user tmuser from 109.202.25.225 port 52762 ssh2
Jul 15 13:31:09 legacy sshd[1055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.202.25.225
...
2019-07-15 19:37:37
191.240.71.169 attackbots
Autoban   191.240.71.169 AUTH/CONNECT
2019-07-15 19:29:00
216.218.206.95 attackspam
scan r
2019-07-15 19:36:16
185.3.134.120 attackspam
Unauthorised access (Jul 15) SRC=185.3.134.120 LEN=40 TTL=243 ID=19652 TCP DPT=445 WINDOW=1024 SYN
2019-07-15 19:55:01
220.136.27.192 attack
Unauthorised access (Jul 15) SRC=220.136.27.192 LEN=52 PREC=0x20 TTL=116 ID=10651 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-15 19:42:37
148.70.23.121 attackspambots
Jul 15 10:01:15 rpi sshd[8187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.121 
Jul 15 10:01:17 rpi sshd[8187]: Failed password for invalid user oscar from 148.70.23.121 port 50408 ssh2
2019-07-15 19:25:01
40.118.46.20 attackbots
Automatic report - Web App Attack
2019-07-15 19:18:28
222.87.147.62 attackbots
Jul 15 10:06:48 * sshd[16343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.87.147.62
Jul 15 10:06:50 * sshd[16343]: Failed password for invalid user strom from 222.87.147.62 port 44176 ssh2
2019-07-15 19:22:34
5.201.161.162 attackspambots
SMB Server BruteForce Attack
2019-07-15 19:48:10
199.195.252.213 attack
$f2bV_matches
2019-07-15 19:40:08
183.157.190.116 attack
Automatic report - Banned IP Access
2019-07-15 19:45:22
46.38.185.218 attackspam
Unauthorised access (Jul 15) SRC=46.38.185.218 LEN=40 TTL=245 ID=52422 TCP DPT=445 WINDOW=1024 SYN
2019-07-15 19:39:11
177.130.137.76 attackspam
Autoban   177.130.137.76 AUTH/CONNECT
2019-07-15 19:34:29

Recently Reported IPs

200.137.135.23 140.123.121.97 140.116.164.149 140.116.86.117
140.113.5.38 133.243.3.78 143.107.209.10 120.105.0.30
131.130.250.148 140.116.97.74 140.116.16.177 203.64.133.17
140.116.67.56 140.127.64.73 158.196.56.78 128.210.26.26
140.116.8.50 140.115.117.180 140.234.252.40 140.116.10.58