Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Republic of China (ROC)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.124.13.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.124.13.105.			IN	A

;; AUTHORITY SECTION:
.			142	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:12:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 105.13.124.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
b';; Truncated, retrying in TCP mode.
105.13.124.140.in-addr.arpa	name = www.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = photolab4640.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = ixd.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = rdhd.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = eng.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = www.eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = jgcampus.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = eecs-aischool.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = news.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = www-en.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = arch1.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = anniversary.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = cttl.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = moeoiac.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = rvrc.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = secc.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = demo.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = ecolife.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = servicecenter.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = isms.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = flexiblepacking.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = service.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = build.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = future-students.
105.13.124.140.in-addr.arpa	name = emo.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = clc.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = utaemba.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = dns.rpage.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = first.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = rcec.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = newsletter.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = osausr.ntut.edu.tw.
105.13.124.140.in-addr.arpa	name = ece.ntut.edu.tw.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
189.190.95.95 attackspam
2020-07-16T21:23:40.001385scmdmz1 sshd[17270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.190.95.95
2020-07-16T21:23:39.997368scmdmz1 sshd[17270]: Invalid user luser from 189.190.95.95 port 57432
2020-07-16T21:23:41.776444scmdmz1 sshd[17270]: Failed password for invalid user luser from 189.190.95.95 port 57432 ssh2
...
2020-07-17 03:43:36
65.50.209.87 attack
2020-07-16T21:40:12.113676snf-827550 sshd[25402]: Invalid user doku from 65.50.209.87 port 37098
2020-07-16T21:40:14.537884snf-827550 sshd[25402]: Failed password for invalid user doku from 65.50.209.87 port 37098 ssh2
2020-07-16T21:45:30.450289snf-827550 sshd[25423]: Invalid user gss from 65.50.209.87 port 39472
...
2020-07-17 04:06:48
212.174.0.211 attackspam
Unauthorized connection attempt from IP address 212.174.0.211 on Port 445(SMB)
2020-07-17 03:41:44
36.57.88.241 attack
Jul 16 17:27:34 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:27:47 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:04 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:23 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 17:28:35 srv01 postfix/smtpd\[23375\]: warning: unknown\[36.57.88.241\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-17 04:04:12
139.59.169.103 attackspam
Jul 16 18:52:03 rocket sshd[11507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103
Jul 16 18:52:05 rocket sshd[11507]: Failed password for invalid user duke from 139.59.169.103 port 50506 ssh2
Jul 16 18:56:22 rocket sshd[12055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.169.103
...
2020-07-17 04:01:55
60.167.182.147 attack
Jul 16 15:44:08 game-panel sshd[8514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.147
Jul 16 15:44:10 game-panel sshd[8514]: Failed password for invalid user conrad from 60.167.182.147 port 44234 ssh2
Jul 16 15:49:45 game-panel sshd[8739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.182.147
2020-07-17 03:54:37
91.204.248.28 attackspam
Tried sshing with brute force.
2020-07-17 04:12:03
138.197.89.212 attackspam
 TCP (SYN) 138.197.89.212:58648 -> port 27788, len 44
2020-07-17 04:05:40
203.245.41.96 attack
SSH Brute-Force reported by Fail2Ban
2020-07-17 03:39:40
139.155.79.110 attack
Jul 16 20:53:45 rocket sshd[29525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110
Jul 16 20:53:47 rocket sshd[29525]: Failed password for invalid user hata from 139.155.79.110 port 56392 ssh2
Jul 16 21:01:09 rocket sshd[30978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.79.110
...
2020-07-17 04:07:28
217.92.210.164 attackspam
(sshd) Failed SSH login from 217.92.210.164 (DE/Germany/pd95cd2a4.dip0.t-ipconnect.de): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 16 21:38:31 amsweb01 sshd[16166]: Invalid user jboss from 217.92.210.164 port 40304
Jul 16 21:38:32 amsweb01 sshd[16166]: Failed password for invalid user jboss from 217.92.210.164 port 40304 ssh2
Jul 16 21:44:49 amsweb01 sshd[17100]: Invalid user japon from 217.92.210.164 port 60330
Jul 16 21:44:52 amsweb01 sshd[17100]: Failed password for invalid user japon from 217.92.210.164 port 60330 ssh2
Jul 16 21:48:47 amsweb01 sshd[17751]: Invalid user mongo from 217.92.210.164 port 49494
2020-07-17 03:51:00
58.243.125.108 attackbotsspam
Port Scan detected!
...
2020-07-17 04:10:13
185.143.73.152 attackspam
Jul 16 20:55:57 blackbee postfix/smtpd[1661]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure
Jul 16 20:56:24 blackbee postfix/smtpd[1589]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure
Jul 16 20:56:52 blackbee postfix/smtpd[1589]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure
Jul 16 20:57:21 blackbee postfix/smtpd[1682]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure
Jul 16 20:57:45 blackbee postfix/smtpd[1586]: warning: unknown[185.143.73.152]: SASL LOGIN authentication failed: authentication failure
...
2020-07-17 03:59:19
45.225.160.235 attackbotsspam
Jul 16 21:43:17 eventyay sshd[21077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235
Jul 16 21:43:19 eventyay sshd[21077]: Failed password for invalid user teamspeak from 45.225.160.235 port 47540 ssh2
Jul 16 21:47:31 eventyay sshd[21271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235
...
2020-07-17 04:06:08
213.43.97.20 attackbotsspam
Unauthorized connection attempt detected from IP address 213.43.97.20 to port 23
2020-07-17 03:53:24

Recently Reported IPs

140.114.89.221 140.128.5.85 140.123.1.2 140.121.140.62
140.128.66.7 140.136.200.88 140.142.142.240 140.127.113.189
140.143.177.206 140.143.148.63 140.143.114.22 140.128.53.66
140.143.201.40 140.142.158.99 140.143.215.139 140.143.213.81
140.143.221.141 140.143.236.152 140.143.255.231 140.143.179.116