Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.116.99.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.116.99.13.			IN	A

;; AUTHORITY SECTION:
.			272	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050500 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 05 16:49:42 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 13.99.116.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.99.116.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.207.60.232 attackbotsspam
(sshd) Failed SSH login from 123.207.60.232 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 11 06:57:46 s1 sshd[2811]: Invalid user vpn from 123.207.60.232 port 47578
Jun 11 06:57:48 s1 sshd[2811]: Failed password for invalid user vpn from 123.207.60.232 port 47578 ssh2
Jun 11 07:01:16 s1 sshd[2919]: Invalid user ysw from 123.207.60.232 port 55126
Jun 11 07:01:18 s1 sshd[2919]: Failed password for invalid user ysw from 123.207.60.232 port 55126 ssh2
Jun 11 07:04:18 s1 sshd[2972]: Invalid user admin from 123.207.60.232 port 58064
2020-06-11 17:25:51
185.64.208.120 attack
Jun 10 21:51:27 Host-KLAX-C postfix/smtps/smtpd[6333]: lost connection after CONNECT from unknown[185.64.208.120]
...
2020-06-11 17:45:51
85.93.20.34 attackspambots
4 attempts against mh-modsecurity-ban on milky
2020-06-11 17:17:20
106.13.206.10 attack
Jun 11 00:18:41 ny01 sshd[12345]: Failed password for root from 106.13.206.10 port 39438 ssh2
Jun 11 00:22:11 ny01 sshd[12828]: Failed password for root from 106.13.206.10 port 53686 ssh2
Jun 11 00:25:51 ny01 sshd[13636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.206.10
2020-06-11 17:43:29
167.71.83.6 attackspam
sshd: Failed password for invalid user .... from 167.71.83.6 port 45884 ssh2 (8 attempts)
2020-06-11 17:34:48
120.132.14.42 attackspam
Jun 11 09:11:04 vmd48417 sshd[11609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.14.42
2020-06-11 17:45:01
79.137.80.140 attack
Automatic report - XMLRPC Attack
2020-06-11 17:22:31
185.176.27.26 attackbots
 TCP (SYN) 185.176.27.26:58982 -> port 20696, len 44
2020-06-11 17:49:39
106.12.24.193 attackspambots
2020-06-11T10:11:02.061139mail.broermann.family sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193
2020-06-11T10:11:02.055502mail.broermann.family sshd[18239]: Invalid user user from 106.12.24.193 port 52102
2020-06-11T10:11:04.518387mail.broermann.family sshd[18239]: Failed password for invalid user user from 106.12.24.193 port 52102 ssh2
2020-06-11T10:13:48.112772mail.broermann.family sshd[18475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193  user=root
2020-06-11T10:13:50.359259mail.broermann.family sshd[18475]: Failed password for root from 106.12.24.193 port 53702 ssh2
...
2020-06-11 17:45:20
74.208.81.55 attackbots
WordPress wp-login brute force :: 74.208.81.55 0.084 BYPASS [11/Jun/2020:08:01:53  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-11 17:24:37
195.54.161.15 attackbotsspam
Port scanning [3 denied]
2020-06-11 17:39:17
197.164.153.102 attackbots
Jun 10 21:51:31 Host-KLAX-C postfix/smtps/smtpd[6334]: lost connection after CONNECT from unknown[197.164.153.102]
...
2020-06-11 17:42:47
211.140.196.90 attackbots
Jun 11 05:52:00 pornomens sshd\[17543\]: Invalid user admin from 211.140.196.90 port 36007
Jun 11 05:52:00 pornomens sshd\[17543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.140.196.90
Jun 11 05:52:02 pornomens sshd\[17543\]: Failed password for invalid user admin from 211.140.196.90 port 36007 ssh2
...
2020-06-11 17:18:46
192.144.94.153 attackbots
bruteforce detected
2020-06-11 17:33:33
14.142.143.138 attackspam
leo_www
2020-06-11 17:22:52

Recently Reported IPs

163.22.18.9 140.134.229.66 202.67.40.230 140.116.87.60
140.116.38.44 115.178.253.22 140.116.116.51 140.116.16.209
140.116.36.48 140.116.228.144 140.116.249.94 138.51.250.153
140.116.133.180 116.206.9.20 140.120.135.29 196.200.133.27
140.116.215.204 140.116.74.163 128.193.206.171 217.113.158.21