Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.213.196.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.213.196.199.		IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 510 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:01:51 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 199.196.213.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.196.213.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.138.31 attackbotsspam
Unauthorized connection attempt detected from IP address 128.199.138.31 to port 2220 [J]
2020-02-02 08:39:46
2607:5300:60:416::1 attackspam
webserver:80 [01/Feb/2020]  "GET /wp-login.php HTTP/1.1" 404 174 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-02 08:30:18
186.167.66.51 attackspam
Unauthorized connection attempt detected from IP address 186.167.66.51 to port 23 [J]
2020-02-02 08:54:47
49.232.34.247 attack
SASL PLAIN auth failed: ruser=...
2020-02-02 08:57:26
106.75.15.142 attack
Unauthorized connection attempt detected from IP address 106.75.15.142 to port 2220 [J]
2020-02-02 08:55:45
165.22.49.52 attackbots
Automatic report - XMLRPC Attack
2020-02-02 08:20:10
92.118.38.40 attackspam
Feb  2 01:23:10 srv01 postfix/smtpd\[11686\]: warning: unknown\[92.118.38.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  2 01:23:32 srv01 postfix/smtpd\[11686\]: warning: unknown\[92.118.38.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  2 01:23:40 srv01 postfix/smtpd\[8166\]: warning: unknown\[92.118.38.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  2 01:23:41 srv01 postfix/smtpd\[11686\]: warning: unknown\[92.118.38.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  2 01:24:06 srv01 postfix/smtpd\[8166\]: warning: unknown\[92.118.38.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-02 08:38:54
37.187.44.143 attack
Unauthorized connection attempt detected from IP address 37.187.44.143 to port 2220 [J]
2020-02-02 08:35:45
148.70.210.77 attackbotsspam
Invalid user gs from 148.70.210.77 port 34240
2020-02-02 08:34:26
37.203.208.3 attackspam
Unauthorized connection attempt detected from IP address 37.203.208.3 to port 2220 [J]
2020-02-02 08:21:51
34.230.156.67 attack
Wordpress login scanning
2020-02-02 08:24:43
51.83.42.108 attackbots
Unauthorized connection attempt detected from IP address 51.83.42.108 to port 2220 [J]
2020-02-02 08:19:09
82.196.108.160 attackbots
Unauthorized connection attempt detected from IP address 82.196.108.160 to port 5555 [J]
2020-02-02 08:56:15
185.36.81.232 attackbots
Feb  2 01:05:15 vmanager6029 postfix/smtpd\[15275\]: warning: unknown\[185.36.81.232\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  2 01:05:35 vmanager6029 postfix/smtpd\[15275\]: warning: unknown\[185.36.81.232\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-02 08:12:15
118.98.73.5 attack
Web App Attack
2020-02-02 08:22:18

Recently Reported IPs

140.213.2.120 140.213.197.29 140.213.2.9 140.213.2.6
140.213.2.83 140.213.20.194 140.213.200.34 140.213.200.231
140.213.201.225 118.70.54.200 140.213.21.221 140.213.204.145
140.213.200.80 140.213.201.243 140.213.213.245 140.213.211.180
140.213.210.153 140.213.210.178 140.213.218.218 118.70.54.49