Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.127.168.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.127.168.1.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 18:22:24 CST 2023
;; MSG SIZE  rcvd: 106
Host info
1.168.127.140.in-addr.arpa domain name pointer dns.wzu.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.168.127.140.in-addr.arpa	name = dns.wzu.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.54.37.204 attackbots
Unauthorized connection attempt detected from IP address 190.54.37.204 to port 11443 [T]
2020-08-14 04:17:52
185.32.66.22 attackspambots
Unauthorized connection attempt detected from IP address 185.32.66.22 to port 445 [T]
2020-08-14 04:05:23
46.161.27.218 attackspambots
Unauthorized connection attempt detected from IP address 46.161.27.218 to port 5900 [T]
2020-08-14 03:58:52
78.138.171.162 attackspambots
Unauthorized connection attempt detected from IP address 78.138.171.162 to port 445 [T]
2020-08-14 04:26:56
218.92.0.220 attack
Aug 13 19:45:24 rush sshd[5644]: Failed password for root from 218.92.0.220 port 32632 ssh2
Aug 13 19:45:33 rush sshd[5646]: Failed password for root from 218.92.0.220 port 39339 ssh2
Aug 13 19:45:35 rush sshd[5646]: Failed password for root from 218.92.0.220 port 39339 ssh2
...
2020-08-14 04:02:19
139.59.17.15 attack
 TCP (SYN) 139.59.17.15:32767 -> port 8545, len 44
2020-08-14 04:08:12
213.200.144.58 attackbotsspam
 TCP (SYN) 213.200.144.58:7827 -> port 23, len 44
2020-08-14 04:02:33
94.231.164.168 attackbots
Unauthorized connection attempt detected from IP address 94.231.164.168 to port 23 [T]
2020-08-14 03:51:50
77.75.11.200 attack
Unauthorized connection attempt detected from IP address 77.75.11.200 to port 23 [T]
2020-08-14 03:56:46
46.165.29.54 attack
Unauthorized connection attempt detected from IP address 46.165.29.54 to port 23 [T]
2020-08-14 04:13:02
185.46.16.209 attack
Unauthorized connection attempt detected from IP address 185.46.16.209 to port 445 [T]
2020-08-14 04:19:46
185.46.16.211 attackbotsspam
Unauthorized connection attempt detected from IP address 185.46.16.211 to port 445 [T]
2020-08-14 04:19:25
80.67.223.41 attackbotsspam
Unauthorized connection attempt detected from IP address 80.67.223.41 to port 1433 [T]
2020-08-14 03:56:31
89.189.156.52 attack
Unauthorized connection attempt detected from IP address 89.189.156.52 to port 23 [T]
2020-08-14 04:26:38
37.205.48.116 attackspambots
Unauthorized connection attempt detected from IP address 37.205.48.116 to port 23 [T]
2020-08-14 03:59:40

Recently Reported IPs

134.208.56.233 115.178.252.133 202.29.211.1 202.29.223.170
134.245.216.29 140.116.88.62 140.116.165.113 140.116.108.134
159.207.142.224 117.194.212.111 163.28.112.124 116.206.38.58
130.158.6.68 140.116.158.55 116.206.38.63 193.60.133.118
140.113.56.27 210.60.171.251 103.142.210.47 223.202.221.203