Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.134.216.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56763
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.134.216.111.		IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 03 17:40:56 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 111.216.134.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.216.134.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.240.34.218 attackspam
SpamReport
2019-12-29 15:02:52
115.218.183.201 attackspambots
Dec 29 01:29:38 esmtp postfix/smtpd[30932]: lost connection after AUTH from unknown[115.218.183.201]
Dec 29 01:29:43 esmtp postfix/smtpd[31042]: lost connection after AUTH from unknown[115.218.183.201]
Dec 29 01:29:57 esmtp postfix/smtpd[31042]: lost connection after AUTH from unknown[115.218.183.201]
Dec 29 01:30:01 esmtp postfix/smtpd[30932]: lost connection after AUTH from unknown[115.218.183.201]
Dec 29 01:30:09 esmtp postfix/smtpd[31042]: lost connection after AUTH from unknown[115.218.183.201]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.218.183.201
2019-12-29 15:07:02
113.164.79.222 attack
Unauthorised access (Dec 29) SRC=113.164.79.222 LEN=52 PREC=0x20 TTL=54 ID=25983 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-29 14:54:07
66.70.188.152 attackspam
Dec 29 01:15:07 server sshd\[8611\]: Failed password for invalid user guest from 66.70.188.152 port 49020 ssh2
Dec 29 09:30:38 server sshd\[21715\]: Invalid user admin from 66.70.188.152
Dec 29 09:30:38 server sshd\[21718\]: Invalid user ec2 from 66.70.188.152
Dec 29 09:30:38 server sshd\[21717\]: Invalid user devops from 66.70.188.152
Dec 29 09:30:38 server sshd\[21720\]: Invalid user ftpuser from 66.70.188.152
Dec 29 09:30:38 server sshd\[21716\]: Invalid user aws from 66.70.188.152
Dec 29 09:30:38 server sshd\[21721\]: Invalid user oracle from 66.70.188.152
Dec 29 09:30:38 server sshd\[21714\]: Invalid user vagrant from 66.70.188.152
...
2019-12-29 14:46:34
159.65.69.32 attack
Automatic report - XMLRPC Attack
2019-12-29 14:43:41
104.131.96.177 attackbotsspam
Fail2Ban Ban Triggered
2019-12-29 14:55:29
49.88.112.70 attackbotsspam
Dec 29 08:05:41 eventyay sshd[16637]: Failed password for root from 49.88.112.70 port 62758 ssh2
Dec 29 08:06:35 eventyay sshd[16653]: Failed password for root from 49.88.112.70 port 25028 ssh2
...
2019-12-29 15:08:14
176.59.7.4 attackbotsspam
1577595262 - 12/29/2019 05:54:22 Host: 176.59.7.4/176.59.7.4 Port: 445 TCP Blocked
2019-12-29 14:25:45
200.150.72.142 attackspambots
Dec 25 19:51:27 sanyalnet-cloud-vps4 sshd[20938]: Connection from 200.150.72.142 port 35432 on 64.137.160.124 port 22
Dec 25 19:51:27 sanyalnet-cloud-vps4 sshd[20938]: Did not receive identification string from 200.150.72.142
Dec 25 19:52:29 sanyalnet-cloud-vps4 sshd[20943]: Connection from 200.150.72.142 port 48354 on 64.137.160.124 port 22
Dec 25 19:52:31 sanyalnet-cloud-vps4 sshd[20943]: Invalid user vagrant from 200.150.72.142
Dec 25 19:52:33 sanyalnet-cloud-vps4 sshd[20943]: Failed password for invalid user vagrant from 200.150.72.142 port 48354 ssh2
Dec 25 19:52:33 sanyalnet-cloud-vps4 sshd[20943]: Received disconnect from 200.150.72.142: 11: Bye Bye [preauth]
Dec 25 19:53:28 sanyalnet-cloud-vps4 sshd[21011]: Connection from 200.150.72.142 port 57602 on 64.137.160.124 port 22
Dec 25 19:53:29 sanyalnet-cloud-vps4 sshd[21011]: Invalid user webadmin from 200.150.72.142
Dec 25 19:53:31 sanyalnet-cloud-vps4 sshd[21011]: Failed password for invalid user webadmin from 20........
-------------------------------
2019-12-29 14:29:32
14.134.184.113 attackspam
Dec 29 07:30:11 amit sshd\[10527\]: Invalid user test from 14.134.184.113
Dec 29 07:30:11 amit sshd\[10527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.134.184.113
Dec 29 07:30:14 amit sshd\[10527\]: Failed password for invalid user test from 14.134.184.113 port 51649 ssh2
...
2019-12-29 15:05:46
192.99.32.86 attackspam
Dec 29 07:19:24 localhost sshd[7609]: Failed password for invalid user ubnt from 192.99.32.86 port 52752 ssh2
Dec 29 07:29:08 localhost sshd[8124]: Failed password for invalid user tippy from 192.99.32.86 port 51754 ssh2
Dec 29 07:32:00 localhost sshd[8231]: Failed password for root from 192.99.32.86 port 55910 ssh2
2019-12-29 15:00:54
132.232.126.28 attackspam
2019-12-29T06:42:55.079200shield sshd\[12505\]: Invalid user admin from 132.232.126.28 port 35270
2019-12-29T06:42:55.083496shield sshd\[12505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.126.28
2019-12-29T06:42:57.220810shield sshd\[12505\]: Failed password for invalid user admin from 132.232.126.28 port 35270 ssh2
2019-12-29T06:46:03.429845shield sshd\[13224\]: Invalid user apache from 132.232.126.28 port 57020
2019-12-29T06:46:03.433868shield sshd\[13224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.126.28
2019-12-29 14:52:49
92.118.37.55 attackspam
Port-scan: detected 333 distinct ports within a 24-hour window.
2019-12-29 14:45:35
218.92.0.171 attackbotsspam
Dec 29 06:54:46 localhost sshd\[38331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Dec 29 06:54:47 localhost sshd\[38331\]: Failed password for root from 218.92.0.171 port 40643 ssh2
Dec 29 06:54:51 localhost sshd\[38331\]: Failed password for root from 218.92.0.171 port 40643 ssh2
Dec 29 06:54:56 localhost sshd\[38331\]: Failed password for root from 218.92.0.171 port 40643 ssh2
Dec 29 06:54:58 localhost sshd\[38331\]: Failed password for root from 218.92.0.171 port 40643 ssh2
...
2019-12-29 15:00:02
157.55.39.157 attack
Automatic report - Banned IP Access
2019-12-29 14:44:13

Recently Reported IPs

140.116.65.91 140.116.125.7 140.116.181.222 140.116.76.178
140.116.238.33 140.116.180.199 140.116.203.61 203.158.195.147
140.116.111.172 140.116.183.106 140.116.80.254 115.178.205.76
137.132.211.23 140.116.102.88 201.158.118.108 130.15.4.213
140.116.240.6 150.19.5.24 147.102.214.169 140.116.104.156