Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.213.196.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.213.196.106.		IN	A

;; AUTHORITY SECTION:
.			377	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:04:50 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 106.196.213.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.196.213.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.31.224.93 attack
Unauthorized connection attempt from IP address 77.31.224.93 on Port 445(SMB)
2020-09-21 14:50:34
103.114.105.83 attack
Sep 21 00:22:14 zeus postfix/smtpd[10932]: warning: unknown[103.114.105.83]: SASL LOGIN authentication failed: authentication failure
Sep 21 02:15:18 zeus postfix/smtpd[1213]: warning: unknown[103.114.105.83]: SASL LOGIN authentication failed: authentication failure
Sep 21 04:09:06 zeus postfix/smtpd[26473]: warning: unknown[103.114.105.83]: SASL LOGIN authentication failed: authentication failure
...
2020-09-21 14:41:10
58.153.67.99 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 14:13:22
144.217.85.124 attack
$f2bV_matches
2020-09-21 14:20:44
94.102.51.28 attack
Port scan on 3 port(s): 1877 52790 56549
2020-09-21 14:34:56
113.22.10.195 attack
Unauthorized connection attempt from IP address 113.22.10.195 on Port 445(SMB)
2020-09-21 14:31:11
79.106.4.201 attack
Dovecot Invalid User Login Attempt.
2020-09-21 14:37:31
66.249.65.203 attackbotsspam
Automatic report - Banned IP Access
2020-09-21 14:28:18
142.44.185.242 attack
[f2b] sshd bruteforce, retries: 1
2020-09-21 14:34:39
104.131.113.106 attack
Port scan followed by SSH.
2020-09-21 14:45:36
141.212.123.190 attack
20-Sep-2020 12:01:52.874 client @0x7f63dae4bda0 141.212.123.190#60972 (researchscan541.eecs.umich.edu): query (cache) 'researchscan541.eecs.umich.edu/A/IN' denied
2020-09-21 14:27:35
120.88.46.226 attackbots
$f2bV_matches
2020-09-21 14:18:21
197.62.35.207 attackspam
Brute%20Force%20SSH
2020-09-21 14:15:20
77.228.190.165 attack
Unauthorized connection attempt from IP address 77.228.190.165 on Port 445(SMB)
2020-09-21 14:35:21
123.30.157.239 attack
Invalid user ant from 123.30.157.239 port 48344
2020-09-21 14:29:58

Recently Reported IPs

242.97.230.204 140.213.33.133 140.213.200.2 140.213.200.93
140.213.54.225 140.213.7.199 140.213.54.79 140.224.149.254
140.213.214.70 140.240.113.11 140.250.92.252 140.224.170.127
140.255.105.34 140.255.137.53 141.101.105.178 140.255.64.184
140.82.2.29 141.101.69.213 141.101.104.10 141.101.76.174