Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tainan

Region: Tainan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.93.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46284
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.93.129.			IN	A

;; AUTHORITY SECTION:
.			294	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051200 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 12 17:36:57 CST 2023
;; MSG SIZE  rcvd: 107
Host info
129.93.116.140.in-addr.arpa domain name pointer pc-93-129.hosp.ncku.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.93.116.140.in-addr.arpa	name = pc-93-129.hosp.ncku.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.175.34.8 attack
Helo
2020-06-07 20:33:45
157.230.41.242 attack
Jun  7 14:06:03 haigwepa sshd[16841]: Failed password for root from 157.230.41.242 port 60914 ssh2
...
2020-06-07 20:39:42
206.189.32.140 attackspam
chaangnoifulda.de 206.189.32.140 [07/Jun/2020:14:09:18 +0200] "POST /wp-login.php HTTP/1.1" 200 6006 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
chaangnoifulda.de 206.189.32.140 [07/Jun/2020:14:09:19 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4065 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-07 20:49:35
81.243.0.119 attackbots
07.06.2020 14:09:21 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-06-07 20:51:14
180.76.246.38 attackspambots
Jun  7 15:25:42 pkdns2 sshd\[8096\]: Failed password for root from 180.76.246.38 port 39648 ssh2Jun  7 15:27:11 pkdns2 sshd\[8164\]: Failed password for root from 180.76.246.38 port 59964 ssh2Jun  7 15:28:43 pkdns2 sshd\[8221\]: Failed password for root from 180.76.246.38 port 52038 ssh2Jun  7 15:30:21 pkdns2 sshd\[8350\]: Failed password for root from 180.76.246.38 port 44166 ssh2Jun  7 15:31:55 pkdns2 sshd\[8416\]: Failed password for root from 180.76.246.38 port 36268 ssh2Jun  7 15:33:29 pkdns2 sshd\[8487\]: Failed password for root from 180.76.246.38 port 56598 ssh2
...
2020-06-07 20:56:00
36.104.146.244 attackbotsspam
Jun  7 14:18:29 lnxmail61 sshd[14328]: Failed password for root from 36.104.146.244 port 35142 ssh2
Jun  7 14:18:29 lnxmail61 sshd[14328]: Failed password for root from 36.104.146.244 port 35142 ssh2
2020-06-07 20:39:11
200.165.167.60 attackbotsspam
Jun  7 14:08:54 lnxmail61 sshd[12930]: Failed password for root from 200.165.167.60 port 24367 ssh2
Jun  7 14:08:54 lnxmail61 sshd[12930]: Failed password for root from 200.165.167.60 port 24367 ssh2
2020-06-07 21:10:22
218.92.0.168 attackspambots
Jun  7 08:57:21 NPSTNNYC01T sshd[20300]: Failed password for root from 218.92.0.168 port 4854 ssh2
Jun  7 08:57:25 NPSTNNYC01T sshd[20300]: Failed password for root from 218.92.0.168 port 4854 ssh2
Jun  7 08:57:31 NPSTNNYC01T sshd[20300]: Failed password for root from 218.92.0.168 port 4854 ssh2
Jun  7 08:57:39 NPSTNNYC01T sshd[20300]: error: maximum authentication attempts exceeded for root from 218.92.0.168 port 4854 ssh2 [preauth]
...
2020-06-07 21:06:07
186.168.115.104 attackbots
Jun  7 14:39:41 ns381471 sshd[31565]: Failed password for root from 186.168.115.104 port 44074 ssh2
2020-06-07 20:49:59
122.114.120.213 attackbotsspam
web-1 [ssh] SSH Attack
2020-06-07 20:37:46
111.229.205.95 attackspam
Jun  7 14:04:41 serwer sshd\[19713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.205.95  user=root
Jun  7 14:04:44 serwer sshd\[19713\]: Failed password for root from 111.229.205.95 port 43650 ssh2
Jun  7 14:09:18 serwer sshd\[20306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.205.95  user=root
...
2020-06-07 20:45:47
34.93.211.49 attackspambots
Jun  7 14:40:15 vps639187 sshd\[24098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.211.49  user=root
Jun  7 14:40:17 vps639187 sshd\[24098\]: Failed password for root from 34.93.211.49 port 41478 ssh2
Jun  7 14:44:02 vps639187 sshd\[24143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.211.49  user=root
...
2020-06-07 20:47:28
211.181.237.108 attackbotsspam
1591531758 - 06/07/2020 14:09:18 Host: 211.181.237.108/211.181.237.108 Port: 445 TCP Blocked
2020-06-07 20:49:10
218.92.0.184 attack
Jun  7 14:09:32 server sshd[28362]: Failed none for root from 218.92.0.184 port 39912 ssh2
Jun  7 14:09:34 server sshd[28362]: Failed password for root from 218.92.0.184 port 39912 ssh2
Jun  7 14:09:43 server sshd[28362]: Failed password for root from 218.92.0.184 port 39912 ssh2
2020-06-07 20:29:00
92.170.38.177 attack
SSH invalid-user multiple login attempts
2020-06-07 21:11:19

Recently Reported IPs

140.134.60.111 140.116.202.85 140.116.54.110 140.116.138.81
134.155.239.237 128.8.132.235 27.67.176.97 120.110.15.5
137.204.115.129 140.116.36.46 150.135.165.62 140.116.132.17
202.67.40.217 216.73.240.142 140.116.118.29 140.116.36.8
140.116.21.120 140.138.181.236 140.116.185.199 128.59.65.172