Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       140.235.140.0 - 140.235.143.255
CIDR:           140.235.140.0/22
NetName:        KOMI-W-01
NetHandle:      NET-140-235-140-0-1
Parent:         NET140 (NET-140-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Komi LLC (KL-348)
RegDate:        2024-10-03
Updated:        2024-10-07
Ref:            https://rdap.arin.net/registry/ip/140.235.140.0


OrgName:        Komi LLC
OrgId:          KL-348
Address:        1942 Broadway Ste 314C
City:           Boulder
StateProv:      CO
PostalCode:     80302
Country:        US
RegDate:        2023-02-12
Updated:        2023-02-22
Ref:            https://rdap.arin.net/registry/entity/KL-348


OrgTechHandle: GUOZI-ARIN
OrgTechName:   Guo, Zi 
OrgTechPhone:  +1-513-223-3330 
OrgTechEmail:  abuse@komillc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GUOZI-ARIN

OrgAbuseHandle: GUOZI-ARIN
OrgAbuseName:   Guo, Zi 
OrgAbusePhone:  +1-513-223-3330 
OrgAbuseEmail:  abuse@komillc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GUOZI-ARIN

# end


# start

NetRange:       140.235.143.0 - 140.235.143.255
CIDR:           140.235.143.0/24
NetName:        KOMI-NET-CUST-US-2
NetHandle:      NET-140-235-143-0-1
Parent:         KOMI-W-01 (NET-140-235-140-0-1)
NetType:        Reassigned
OriginAS:       
Customer:       Komi LLC (C11261758)
RegDate:        2025-07-02
Updated:        2025-07-02
Ref:            https://rdap.arin.net/registry/ip/140.235.143.0


CustName:       Komi LLC
Address:        530 W 6th St
City:           Los Angeles
StateProv:      CA
PostalCode:     90017
Country:        US
RegDate:        2025-07-02
Updated:        2025-07-02
Ref:            https://rdap.arin.net/registry/entity/C11261758

OrgTechHandle: GUOZI-ARIN
OrgTechName:   Guo, Zi 
OrgTechPhone:  +1-513-223-3330 
OrgTechEmail:  abuse@komillc.net
OrgTechRef:    https://rdap.arin.net/registry/entity/GUOZI-ARIN

OrgAbuseHandle: GUOZI-ARIN
OrgAbuseName:   Guo, Zi 
OrgAbusePhone:  +1-513-223-3330 
OrgAbuseEmail:  abuse@komillc.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GUOZI-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.235.143.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18633
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.235.143.101.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 31 20:06:03 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 101.143.235.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.143.235.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.67.14.163 attack
Invalid user ubnt from 45.67.14.163 port 59372
2019-11-18 14:16:08
47.29.34.192 attackbots
Unauthorised access (Nov 18) SRC=47.29.34.192 LEN=52 TOS=0x08 PREC=0x20 TTL=108 ID=5998 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-18 13:59:20
45.125.65.87 attackbots
\[2019-11-18 01:02:04\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T01:02:04.151-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="2207701790901148833566011",SessionID="0x7fdf2c2fde48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.87/52408",ACLName="no_extension_match"
\[2019-11-18 01:02:41\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T01:02:41.664-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="440790901148833566011",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.87/53394",ACLName="no_extension_match"
\[2019-11-18 01:03:12\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T01:03:12.274-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4402201790901148833566011",SessionID="0x7fdf2cc12668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.65.87
2019-11-18 14:12:14
49.88.112.114 attackspambots
Nov 17 19:51:45 wbs sshd\[3186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov 17 19:51:46 wbs sshd\[3186\]: Failed password for root from 49.88.112.114 port 27158 ssh2
Nov 17 19:56:13 wbs sshd\[3517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Nov 17 19:56:15 wbs sshd\[3517\]: Failed password for root from 49.88.112.114 port 64624 ssh2
Nov 17 19:57:17 wbs sshd\[3592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-11-18 13:58:49
23.228.90.14 attack
SQL injection attempts.
2019-11-18 13:33:16
222.186.173.183 attack
2019-11-17T22:16:35.890886homeassistant sshd[22132]: Failed password for root from 222.186.173.183 port 31448 ssh2
2019-11-18T05:49:56.394763homeassistant sshd[27454]: Failed none for root from 222.186.173.183 port 23952 ssh2
2019-11-18T05:49:56.600050homeassistant sshd[27454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
...
2019-11-18 13:52:58
115.152.253.34 attackbotsspam
11/18/2019-05:53:52.553890 115.152.253.34 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-18 13:42:56
77.247.108.77 attackspam
11/18/2019-05:58:18.191136 77.247.108.77 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 74
2019-11-18 13:54:00
218.92.0.203 attackspam
Nov 18 05:58:20 zeus sshd[25225]: Failed password for root from 218.92.0.203 port 52114 ssh2
Nov 18 05:58:24 zeus sshd[25225]: Failed password for root from 218.92.0.203 port 52114 ssh2
Nov 18 05:58:27 zeus sshd[25225]: Failed password for root from 218.92.0.203 port 52114 ssh2
Nov 18 05:59:06 zeus sshd[25232]: Failed password for root from 218.92.0.203 port 35741 ssh2
2019-11-18 14:04:11
45.45.45.45 attackspam
18.11.2019 04:53:14 Recursive DNS scan
2019-11-18 13:54:55
45.125.66.66 attack
\[2019-11-18 00:17:22\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T00:17:22.347-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0025748957156001",SessionID="0x7fdf2c23e548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/61169",ACLName="no_extension_match"
\[2019-11-18 00:17:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T00:17:57.239-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0025848957156001",SessionID="0x7fdf2cd1cd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/49963",ACLName="no_extension_match"
\[2019-11-18 00:18:24\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-18T00:18:24.983-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0026048957156001",SessionID="0x7fdf2cc12668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.66/60570",ACLName="no_ext
2019-11-18 13:31:14
104.194.9.11 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/104.194.9.11/ 
 
 US - 1H : (274)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN23470 
 
 IP : 104.194.9.11 
 
 CIDR : 104.194.9.0/24 
 
 PREFIX COUNT : 215 
 
 UNIQUE IP COUNT : 55296 
 
 
 ATTACKS DETECTED ASN23470 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-18 05:52:29 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-18 14:05:35
195.246.57.114 attack
11/17/2019-23:52:21.000788 195.246.57.114 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-18 14:09:26
218.10.97.44 attack
Unauthorised access (Nov 18) SRC=218.10.97.44 LEN=40 TTL=241 ID=64143 TCP DPT=1433 WINDOW=1024 SYN
2019-11-18 13:55:21
66.38.32.24 attackspam
GET /wp-admin/
2019-11-18 13:30:33

Recently Reported IPs

167.172.177.68 165.232.125.139 164.92.174.223 66.249.77.97
184.73.104.41 156.238.226.251 47.92.241.103 20.64.105.242
110.19.100.45 39.99.132.30 39.98.108.112 104.200.30.32
182.107.120.233 47.92.199.86 43.142.37.59 1.161.34.126
113.63.34.90 165.245.178.22 217.154.23.3 123.58.10.198