Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dallas

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.211.169.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.211.169.196.		IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020111700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 17 21:26:43 CST 2020
;; MSG SIZE  rcvd: 119
Host info
196.169.211.140.in-addr.arpa is an alias for 196.192-255.169.211.140.in-addr.arpa.
196.192-255.169.211.140.in-addr.arpa domain name pointer proxy06.fedoraproject.org.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.169.211.140.in-addr.arpa	canonical name = 196.192-255.169.211.140.in-addr.arpa.
196.192-255.169.211.140.in-addr.arpa	name = proxy06.fedoraproject.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.138.228 attack
8091/tcp 23/tcp 4443/tcp...
[2020-04-29/05-14]14pkt,12pt.(tcp),1pt.(udp)
2020-05-14 15:54:05
113.164.94.10 attack
Unauthorised access (May 14) SRC=113.164.94.10 LEN=52 TTL=107 ID=15687 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-14 16:00:57
14.98.200.167 attackbotsspam
Invalid user paul from 14.98.200.167 port 33992
2020-05-14 16:32:32
103.79.141.156 attack
May 14 09:18:45 debian-2gb-nbg1-2 kernel: \[11699579.631247\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.79.141.156 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=11183 PROTO=TCP SPT=55944 DPT=8088 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-14 16:01:53
118.69.173.199 attackspambots
118.69.173.199 - - [14/May/2020:08:51:40 +0300] "POST /wp-login.php HTTP/1.1" 200 2202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-14 16:32:14
180.168.141.246 attack
2020-05-14T10:00:55.805103vps773228.ovh.net sshd[720]: Failed password for invalid user luccisano from 180.168.141.246 port 57476 ssh2
2020-05-14T10:04:50.904020vps773228.ovh.net sshd[805]: Invalid user hexin from 180.168.141.246 port 32818
2020-05-14T10:04:50.913747vps773228.ovh.net sshd[805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.141.246
2020-05-14T10:04:50.904020vps773228.ovh.net sshd[805]: Invalid user hexin from 180.168.141.246 port 32818
2020-05-14T10:04:52.607853vps773228.ovh.net sshd[805]: Failed password for invalid user hexin from 180.168.141.246 port 32818 ssh2
...
2020-05-14 16:19:13
137.63.195.20 attack
Invalid user gala from 137.63.195.20 port 54116
2020-05-14 15:50:52
218.75.156.247 attackbotsspam
May 14 04:04:51 NPSTNNYC01T sshd[21302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.156.247
May 14 04:04:54 NPSTNNYC01T sshd[21302]: Failed password for invalid user cms from 218.75.156.247 port 55022 ssh2
May 14 04:13:04 NPSTNNYC01T sshd[22112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.75.156.247
...
2020-05-14 16:34:22
185.151.242.186 attackspambots
 TCP (SYN) 185.151.242.186:20242 -> port 7000, len 44
2020-05-14 15:59:03
118.27.10.61 attackspam
May 14 06:50:14 minden010 sshd[799]: Failed password for root from 118.27.10.61 port 47520 ssh2
May 14 06:54:25 minden010 sshd[2536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.10.61
May 14 06:54:27 minden010 sshd[2536]: Failed password for invalid user dewiretnowati from 118.27.10.61 port 55464 ssh2
...
2020-05-14 16:31:32
49.233.147.108 attack
May 14 05:44:54 v22019038103785759 sshd\[23284\]: Invalid user lavanderia from 49.233.147.108 port 33132
May 14 05:44:54 v22019038103785759 sshd\[23284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.147.108
May 14 05:44:55 v22019038103785759 sshd\[23284\]: Failed password for invalid user lavanderia from 49.233.147.108 port 33132 ssh2
May 14 05:49:30 v22019038103785759 sshd\[23541\]: Invalid user test from 49.233.147.108 port 50628
May 14 05:49:30 v22019038103785759 sshd\[23541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.147.108
...
2020-05-14 16:31:11
182.160.100.109 attackbots
Brute Force - Dovecot
2020-05-14 16:28:56
2.62.45.184 attackbotsspam
(eximsyntax) Exim syntax errors from 2.62.45.184 (RU/Russia/2-62-45-184-bbc-dynamic.kuzbass.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-14 08:19:09 SMTP call from 2-62-45-184-bbc-dynamic.kuzbass.net [2.62.45.184] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-05-14 16:42:19
78.134.109.105 attackbotsspam
REQUESTED PAGE: /shell?busybox
2020-05-14 16:30:39
192.162.9.163 attack
May 14 05:49:20 debian-2gb-nbg1-2 kernel: \[11687015.703128\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=192.162.9.163 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=28829 PROTO=TCP SPT=18176 DPT=23 WINDOW=41208 RES=0x00 SYN URGP=0
2020-05-14 16:40:17

Recently Reported IPs

139.219.10.167 14.183.235.194 14.243.218.212 171.101.116.81
171.98.99.107 18.191.242.191 18.237.253.144 27.41.144.48
36.90.46.48 37.54.4.165 42.224.69.88 42.235.82.165
45.23.6.162 67.87.199.65 82.28.130.188 185.63.153.71
164.68.111.144 164.68.111.20 167.71.158.160 91.175.243.242