Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.138.204.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.138.204.154.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:54:14 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 154.204.138.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.204.138.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
50.193.147.222 attackspam
Honeypot hit.
2019-08-02 00:14:47
36.235.4.78 attackspam
Telnet Server BruteForce Attack
2019-08-02 01:39:17
181.211.148.26 attackspambots
Aug  1 08:15:08 mail postfix/postscreen[9806]: PREGREET 48 after 0.54 from [181.211.148.26]:45777: EHLO 26.148.211.181.static.anycast.cnt-grms.ec

...
2019-08-02 00:22:54
209.235.67.49 attack
Aug  1 17:28:36 * sshd[25681]: Failed password for git from 209.235.67.49 port 57578 ssh2
Aug  1 17:32:53 * sshd[26204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
2019-08-01 23:59:06
49.204.76.142 attackspam
Aug  1 19:16:29 vps647732 sshd[27748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.204.76.142
Aug  1 19:16:31 vps647732 sshd[27748]: Failed password for invalid user test01 from 49.204.76.142 port 58605 ssh2
...
2019-08-02 01:41:20
185.117.154.120 attackspambots
Aug  1 16:32:13 debian sshd\[9749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.117.154.120  user=root
Aug  1 16:32:15 debian sshd\[9749\]: Failed password for root from 185.117.154.120 port 58854 ssh2
...
2019-08-01 23:35:25
80.227.12.38 attack
Automatic report - Banned IP Access
2019-08-02 01:39:51
191.240.89.144 attackspambots
libpam_shield report: forced login attempt
2019-08-02 01:23:30
35.224.59.213 attackspambots
Telnet brute force and port scan
2019-08-02 00:18:33
37.52.9.244 attackbotsspam
2019-08-01T17:30:45.921727lon01.zurich-datacenter.net sshd\[21830\]: Invalid user raul from 37.52.9.244 port 46550
2019-08-01T17:30:45.932059lon01.zurich-datacenter.net sshd\[21830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244-9-52-37.pool.ukrtel.net
2019-08-01T17:30:47.870936lon01.zurich-datacenter.net sshd\[21830\]: Failed password for invalid user raul from 37.52.9.244 port 46550 ssh2
2019-08-01T17:35:21.174712lon01.zurich-datacenter.net sshd\[21920\]: Invalid user test from 37.52.9.244 port 42478
2019-08-01T17:35:21.183695lon01.zurich-datacenter.net sshd\[21920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244-9-52-37.pool.ukrtel.net
...
2019-08-01 23:39:36
45.227.255.121 attackbots
RDP
2019-08-02 01:10:55
18.138.76.240 attackspambots
Aug  1 15:24:53 MK-Soft-Root2 sshd\[20958\]: Invalid user elbe from 18.138.76.240 port 60534
Aug  1 15:24:53 MK-Soft-Root2 sshd\[20958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.138.76.240
Aug  1 15:24:56 MK-Soft-Root2 sshd\[20958\]: Failed password for invalid user elbe from 18.138.76.240 port 60534 ssh2
...
2019-08-01 23:40:53
51.68.65.174 attackspam
Tried sshing with brute force.
2019-08-01 23:26:47
188.131.134.157 attack
Jan 23 07:24:02 vtv3 sshd\[12340\]: Invalid user convoc from 188.131.134.157 port 52398
Jan 23 07:24:02 vtv3 sshd\[12340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Jan 23 07:24:04 vtv3 sshd\[12340\]: Failed password for invalid user convoc from 188.131.134.157 port 52398 ssh2
Jan 23 07:29:02 vtv3 sshd\[13785\]: Invalid user isac from 188.131.134.157 port 54298
Jan 23 07:29:02 vtv3 sshd\[13785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:08 vtv3 sshd\[21847\]: Invalid user alfresco from 188.131.134.157 port 54328
Feb 16 17:22:08 vtv3 sshd\[21847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.134.157
Feb 16 17:22:11 vtv3 sshd\[21847\]: Failed password for invalid user alfresco from 188.131.134.157 port 54328 ssh2
Feb 16 17:28:06 vtv3 sshd\[23346\]: Invalid user ubuntu from 188.131.134.157 port 49524
Feb 16 17:28:06
2019-08-01 23:57:57
157.230.154.97 attackbotsspam
Aug  1 17:33:20 plex sshd[16213]: Invalid user office from 157.230.154.97 port 50668
2019-08-01 23:37:32

Recently Reported IPs

30.5.230.14 199.70.148.10 41.31.9.243 178.248.216.150
91.207.62.18 26.56.112.59 117.38.191.116 6.200.251.252
60.93.160.138 216.228.182.188 60.7.24.241 121.204.101.72
35.108.233.222 187.38.49.199 27.22.86.50 4.236.43.217
188.199.180.65 104.253.241.92 207.180.253.118 128.133.188.193