Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.20.142.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.20.142.79.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:24:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 79.142.20.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 140.20.142.79.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
116.225.36.84 attackbotsspam
Sep  4 06:23:14 vtv3 sshd\[21272\]: Invalid user www from 116.225.36.84 port 65245
Sep  4 06:23:14 vtv3 sshd\[21272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.225.36.84
Sep  4 06:23:16 vtv3 sshd\[21272\]: Failed password for invalid user www from 116.225.36.84 port 65245 ssh2
Sep  4 06:26:01 vtv3 sshd\[23138\]: Invalid user nothing from 116.225.36.84 port 34600
Sep  4 06:26:01 vtv3 sshd\[23138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.225.36.84
Sep  4 06:36:52 vtv3 sshd\[29114\]: Invalid user ubuntu from 116.225.36.84 port 25030
Sep  4 06:36:52 vtv3 sshd\[29114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.225.36.84
Sep  4 06:36:54 vtv3 sshd\[29114\]: Failed password for invalid user ubuntu from 116.225.36.84 port 25030 ssh2
Sep  4 06:39:33 vtv3 sshd\[30538\]: Invalid user consulta from 116.225.36.84 port 50882
Sep  4 06:39:33 vtv3 sshd\[30538\]: pa
2019-09-04 15:40:19
201.16.251.121 attackbots
Sep  4 05:05:37 dev0-dcde-rnet sshd[11675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.251.121
Sep  4 05:05:40 dev0-dcde-rnet sshd[11675]: Failed password for invalid user demo3 from 201.16.251.121 port 40113 ssh2
Sep  4 05:26:02 dev0-dcde-rnet sshd[11740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.251.121
2019-09-04 15:38:26
201.182.33.150 attack
Sep  3 20:36:39 lcdev sshd\[24460\]: Invalid user test from 201.182.33.150
Sep  3 20:36:39 lcdev sshd\[24460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.33.150
Sep  3 20:36:40 lcdev sshd\[24460\]: Failed password for invalid user test from 201.182.33.150 port 42668 ssh2
Sep  3 20:42:06 lcdev sshd\[25119\]: Invalid user wordpress from 201.182.33.150
Sep  3 20:42:06 lcdev sshd\[25119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.182.33.150
2019-09-04 15:50:11
222.164.192.225 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-04 15:26:58
118.25.55.87 attack
Sep  4 07:24:19 hcbbdb sshd\[17364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.55.87  user=root
Sep  4 07:24:21 hcbbdb sshd\[17364\]: Failed password for root from 118.25.55.87 port 36026 ssh2
Sep  4 07:30:31 hcbbdb sshd\[18020\]: Invalid user elizabeth from 118.25.55.87
Sep  4 07:30:31 hcbbdb sshd\[18020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.55.87
Sep  4 07:30:33 hcbbdb sshd\[18020\]: Failed password for invalid user elizabeth from 118.25.55.87 port 51824 ssh2
2019-09-04 15:39:40
213.33.244.218 attackspambots
445/tcp 445/tcp 445/tcp
[2019-07-06/09-04]3pkt
2019-09-04 15:55:16
45.225.25.103 attackspambots
Sep  3 21:17:52 aiointranet sshd\[11299\]: Invalid user sjen from 45.225.25.103
Sep  3 21:17:52 aiointranet sshd\[11299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.25.103
Sep  3 21:17:54 aiointranet sshd\[11299\]: Failed password for invalid user sjen from 45.225.25.103 port 53590 ssh2
Sep  3 21:22:58 aiointranet sshd\[11745\]: Invalid user group from 45.225.25.103
Sep  3 21:22:58 aiointranet sshd\[11745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.25.103
2019-09-04 15:36:17
91.225.122.58 attackspam
Sep  4 06:36:41 markkoudstaal sshd[12797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.122.58
Sep  4 06:36:43 markkoudstaal sshd[12797]: Failed password for invalid user ts2 from 91.225.122.58 port 48536 ssh2
Sep  4 06:41:28 markkoudstaal sshd[13324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.225.122.58
2019-09-04 16:16:53
203.199.141.158 attackspam
Sep  4 08:08:39 SilenceServices sshd[3194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.141.158
Sep  4 08:08:41 SilenceServices sshd[3194]: Failed password for invalid user kjh from 203.199.141.158 port 39156 ssh2
Sep  4 08:13:15 SilenceServices sshd[5114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.199.141.158
2019-09-04 15:27:16
80.82.65.105 attack
*Port Scan* detected from 80.82.65.105 (NL/Netherlands/no-reverse-dns-configured.com). 4 hits in the last 70 seconds
2019-09-04 15:54:35
14.63.221.108 attackbotsspam
Sep  4 02:13:42 aat-srv002 sshd[3652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.221.108
Sep  4 02:13:44 aat-srv002 sshd[3652]: Failed password for invalid user pos from 14.63.221.108 port 46487 ssh2
Sep  4 02:19:05 aat-srv002 sshd[3874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.221.108
Sep  4 02:19:07 aat-srv002 sshd[3874]: Failed password for invalid user cmxi from 14.63.221.108 port 40285 ssh2
...
2019-09-04 15:37:18
65.187.196.192 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-08-25/09-04]5pkt,1pt.(tcp)
2019-09-04 15:26:19
131.221.97.206 attackbots
Sep  4 05:15:07 mail1 sshd\[27780\]: Invalid user etc_mail from 131.221.97.206 port 56603
Sep  4 05:15:07 mail1 sshd\[27780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.97.206
Sep  4 05:15:09 mail1 sshd\[27780\]: Failed password for invalid user etc_mail from 131.221.97.206 port 56603 ssh2
Sep  4 05:26:01 mail1 sshd\[32665\]: Invalid user va from 131.221.97.206 port 47195
Sep  4 05:26:01 mail1 sshd\[32665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.97.206
...
2019-09-04 15:39:11
165.22.143.139 attackspambots
Sep  4 09:18:16 areeb-Workstation sshd[20530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.139
Sep  4 09:18:18 areeb-Workstation sshd[20530]: Failed password for invalid user ts from 165.22.143.139 port 43348 ssh2
...
2019-09-04 16:14:45
192.42.116.17 attackspam
Sep  4 09:15:20 srv206 sshd[3660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=this-is-a-tor-exit-node-hviv117.hviv.nl  user=root
Sep  4 09:15:22 srv206 sshd[3660]: Failed password for root from 192.42.116.17 port 44750 ssh2
...
2019-09-04 16:13:45

Recently Reported IPs

63.226.105.211 47.127.58.226 160.157.69.17 27.76.183.103
44.162.25.24 146.194.191.50 210.32.73.198 53.154.90.113
107.214.124.134 5.215.112.43 46.186.84.31 81.175.55.196
26.182.225.144 176.76.39.204 117.126.136.192 245.128.243.27
85.101.174.67 250.105.81.100 7.99.30.27 22.34.111.222