Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Wisconsin Whitewater

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.146.132.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50619
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.146.132.211.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 29 01:08:41 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 211.132.146.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 211.132.146.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.93.235.74 attackbotsspam
Jul 29 18:48:57 jane sshd[31646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74 
Jul 29 18:48:59 jane sshd[31646]: Failed password for invalid user bobo from 111.93.235.74 port 32443 ssh2
...
2020-07-30 01:21:19
140.238.8.111 attack
Invalid user ewan from 140.238.8.111 port 53358
2020-07-30 01:09:50
212.70.149.51 attackbotsspam
Jul 29 18:49:31 relay postfix/smtpd\[22786\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 18:49:44 relay postfix/smtpd\[22887\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 18:49:59 relay postfix/smtpd\[22786\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 18:50:11 relay postfix/smtpd\[29567\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 18:50:26 relay postfix/smtpd\[22786\]: warning: unknown\[212.70.149.51\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-30 00:50:53
89.46.86.65 attackspam
Jul 29 17:29:52 vps333114 sshd[26474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.46.86.65
Jul 29 17:29:54 vps333114 sshd[26474]: Failed password for invalid user hdfs from 89.46.86.65 port 53578 ssh2
...
2020-07-30 01:04:27
1.47.108.55 attackspambots
1596024585 - 07/29/2020 14:09:45 Host: 1.47.108.55/1.47.108.55 Port: 445 TCP Blocked
2020-07-30 00:55:07
182.151.41.208 attack
Jul 29 17:40:48 h2829583 sshd[25246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.41.208
2020-07-30 01:17:44
106.12.220.19 attackspambots
Automatic report BANNED IP
2020-07-30 01:11:15
45.143.223.137 attack
spam
2020-07-30 00:57:47
37.187.72.146 attackspambots
37.187.72.146 - - [29/Jul/2020:17:42:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2433 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.72.146 - - [29/Jul/2020:17:42:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2438 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.187.72.146 - - [29/Jul/2020:17:42:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2433 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-30 01:06:04
119.42.121.25 attackbots
belitungshipwreck.org 119.42.121.25 [29/Jul/2020:14:09:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4304 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
belitungshipwreck.org 119.42.121.25 [29/Jul/2020:14:09:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4304 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-07-30 01:25:31
47.176.104.74 attackbots
2020-07-29T18:34:46.733850amanda2.illicoweb.com sshd\[18676\]: Invalid user sunyifan_stu from 47.176.104.74 port 21536
2020-07-29T18:34:46.739014amanda2.illicoweb.com sshd\[18676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.104.74
2020-07-29T18:34:48.754399amanda2.illicoweb.com sshd\[18676\]: Failed password for invalid user sunyifan_stu from 47.176.104.74 port 21536 ssh2
2020-07-29T18:40:06.182035amanda2.illicoweb.com sshd\[19173\]: Invalid user liangzheming from 47.176.104.74 port 39437
2020-07-29T18:40:06.188117amanda2.illicoweb.com sshd\[19173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.176.104.74
...
2020-07-30 01:11:55
80.82.77.240 attackbots
probes 10 times on the port 18080 5000 5004 5800 5900 8443 8880 9000 9050 9200 resulting in total of 125 scans from 80.82.64.0/20 block.
2020-07-30 01:21:43
112.196.9.88 attack
Jul 29 19:12:06 *hidden* sshd[32096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.9.88 Jul 29 19:12:07 *hidden* sshd[32096]: Failed password for invalid user xierx from 112.196.9.88 port 35490 ssh2 Jul 29 19:19:48 *hidden* sshd[35184]: Invalid user hgrepo from 112.196.9.88 port 49132
2020-07-30 01:28:41
106.124.130.114 attack
2020-07-29T14:21:42.131056abusebot-2.cloudsearch.cf sshd[13365]: Invalid user psz from 106.124.130.114 port 40088
2020-07-29T14:21:42.137873abusebot-2.cloudsearch.cf sshd[13365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114
2020-07-29T14:21:42.131056abusebot-2.cloudsearch.cf sshd[13365]: Invalid user psz from 106.124.130.114 port 40088
2020-07-29T14:21:44.089060abusebot-2.cloudsearch.cf sshd[13365]: Failed password for invalid user psz from 106.124.130.114 port 40088 ssh2
2020-07-29T14:29:40.416659abusebot-2.cloudsearch.cf sshd[13520]: Invalid user hntt from 106.124.130.114 port 42697
2020-07-29T14:29:40.422618abusebot-2.cloudsearch.cf sshd[13520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.130.114
2020-07-29T14:29:40.416659abusebot-2.cloudsearch.cf sshd[13520]: Invalid user hntt from 106.124.130.114 port 42697
2020-07-29T14:29:42.996122abusebot-2.cloudsearch.cf sshd[13520]: 
...
2020-07-30 00:59:58
36.94.100.74 attackbots
Jul 29 18:41:00 rancher-0 sshd[645576]: Invalid user suchenghui from 36.94.100.74 port 33828
...
2020-07-30 01:27:09

Recently Reported IPs

166.142.31.73 178.170.164.138 106.108.82.45 39.93.91.73
98.104.165.13 44.118.138.251 149.92.159.144 14.239.193.103
134.79.210.151 124.79.193.7 53.175.253.174 125.215.191.247
2.226.106.142 90.170.106.107 153.251.78.242 101.158.80.190
115.237.46.33 168.8.40.143 159.39.66.181 93.98.24.221