Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bekasi

Region: West Java

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
140.213.54.192 attackspam
xmlrpc attack
2020-08-02 18:23:09
140.213.54.29 attack
1594987994 - 07/17/2020 14:13:14 Host: 140.213.54.29/140.213.54.29 Port: 445 TCP Blocked
2020-07-17 22:31:46
140.213.54.234 attackbotsspam
1591502250 - 06/07/2020 05:57:30 Host: 140.213.54.234/140.213.54.234 Port: 445 TCP Blocked
2020-06-07 13:24:41
140.213.54.232 attack
Unauthorized connection attempt from IP address 140.213.54.232 on Port 445(SMB)
2020-02-16 10:11:12
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 140.213.54.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;140.213.54.11.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Wed Jun 30 16:35:50 CST 2021
;; MSG SIZE  rcvd: 42

'
Host info
Host 11.54.213.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.54.213.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
223.240.70.4 attackspambots
May  2 17:34:23 ws22vmsma01 sshd[142510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.70.4
May  2 17:34:24 ws22vmsma01 sshd[142510]: Failed password for invalid user wjchen from 223.240.70.4 port 35890 ssh2
...
2020-05-03 05:23:17
43.240.125.195 attack
SSH Invalid Login
2020-05-03 05:55:39
198.108.67.36 attackbots
" "
2020-05-03 05:26:04
84.81.118.176 attackspambots
[02/May/2020:22:34:32 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2020-05-03 05:14:50
164.132.197.108 attack
SSH Brute Force
2020-05-03 05:31:33
111.231.66.135 attack
SSH Brute Force
2020-05-03 05:50:14
165.227.51.249 attackspambots
SSH Brute Force
2020-05-03 05:31:21
138.197.89.212 attackbotsspam
SSH Invalid Login
2020-05-03 05:48:22
195.54.167.15 attackbotsspam
May  2 23:22:55 debian-2gb-nbg1-2 kernel: \[10713481.688093\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=23752 PROTO=TCP SPT=51193 DPT=18732 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-03 05:26:29
190.205.59.6 attackspambots
SSH Brute Force
2020-05-03 05:43:35
54.38.187.126 attack
Fail2Ban - SSH Bruteforce Attempt
2020-05-03 05:24:05
194.6.231.122 attack
SSH Brute Force
2020-05-03 05:42:48
129.28.106.99 attack
SSH Invalid Login
2020-05-03 05:49:05
138.68.4.8 attack
SSH Brute Force
2020-05-03 05:33:32
61.133.232.252 attackbots
SSH Invalid Login
2020-05-03 05:52:49

Recently Reported IPs

116.179.32.79 3.72.4.171 116.179.32.22 13.212.6.57
198.23.179.226 138.199.24.10 193.57.40.202 203.96.243.253
45.248.21.43 203.126.223.163 187.189.172.24 168.63.154.78
116.179.32.236 116.179.32.155 191.96.106.98 116.179.32.130
84.122.242.188 114.125.230.137 140.213.156.124 90.209.62.152