Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.30.114.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.30.114.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 11:45:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 64.114.30.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.114.30.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.231.55.203 attackbotsspam
unauthorized connection attempt
2020-06-27 14:01:25
51.161.34.8 attackbotsspam
2020-06-27T08:57:27.482801hostname sshd[30316]: Failed password for invalid user jyh from 51.161.34.8 port 52810 ssh2
2020-06-27T09:05:09.719440hostname sshd[3605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-54abb8d7.vps.ovh.ca  user=root
2020-06-27T09:05:11.105798hostname sshd[3605]: Failed password for root from 51.161.34.8 port 36970 ssh2
...
2020-06-27 13:48:30
40.65.120.158 attackbotsspam
Jun 27 07:46:51 mout sshd[32172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.65.120.158  user=root
Jun 27 07:46:53 mout sshd[32172]: Failed password for root from 40.65.120.158 port 51636 ssh2
2020-06-27 14:25:29
62.210.114.58 attack
Jun 27 03:55:01 marvibiene sshd[13198]: Invalid user renata from 62.210.114.58 port 49510
Jun 27 03:55:01 marvibiene sshd[13198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.114.58
Jun 27 03:55:01 marvibiene sshd[13198]: Invalid user renata from 62.210.114.58 port 49510
Jun 27 03:55:02 marvibiene sshd[13198]: Failed password for invalid user renata from 62.210.114.58 port 49510 ssh2
...
2020-06-27 13:52:50
46.38.150.47 attack
Jun 27 07:48:16 relay postfix/smtpd\[1028\]: warning: unknown\[46.38.150.47\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 07:49:03 relay postfix/smtpd\[26925\]: warning: unknown\[46.38.150.47\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 07:49:12 relay postfix/smtpd\[1026\]: warning: unknown\[46.38.150.47\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 07:50:02 relay postfix/smtpd\[8238\]: warning: unknown\[46.38.150.47\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 27 07:50:14 relay postfix/smtpd\[21493\]: warning: unknown\[46.38.150.47\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-27 13:51:47
155.94.177.153 attackspambots
Jun 27 06:35:39 serwer sshd\[31226\]: Invalid user public from 155.94.177.153 port 54592
Jun 27 06:35:39 serwer sshd\[31226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.177.153
Jun 27 06:35:41 serwer sshd\[31226\]: Failed password for invalid user public from 155.94.177.153 port 54592 ssh2
...
2020-06-27 14:01:08
49.233.136.245 attack
2020-06-27T05:39:02.588705shield sshd\[15173\]: Invalid user caro from 49.233.136.245 port 46898
2020-06-27T05:39:02.593930shield sshd\[15173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.136.245
2020-06-27T05:39:05.143739shield sshd\[15173\]: Failed password for invalid user caro from 49.233.136.245 port 46898 ssh2
2020-06-27T05:41:48.910538shield sshd\[15325\]: Invalid user sdtdserver from 49.233.136.245 port 37730
2020-06-27T05:41:48.914148shield sshd\[15325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.136.245
2020-06-27 13:50:47
61.177.172.61 attackspam
Jun 27 09:07:05 ift sshd\[32087\]: Failed password for root from 61.177.172.61 port 20598 ssh2Jun 27 09:07:09 ift sshd\[32087\]: Failed password for root from 61.177.172.61 port 20598 ssh2Jun 27 09:07:16 ift sshd\[32087\]: Failed password for root from 61.177.172.61 port 20598 ssh2Jun 27 09:07:19 ift sshd\[32087\]: Failed password for root from 61.177.172.61 port 20598 ssh2Jun 27 09:07:22 ift sshd\[32087\]: Failed password for root from 61.177.172.61 port 20598 ssh2
...
2020-06-27 14:13:32
222.186.175.167 attack
Jun 27 08:10:58 pve1 sshd[8670]: Failed password for root from 222.186.175.167 port 61978 ssh2
Jun 27 08:11:02 pve1 sshd[8670]: Failed password for root from 222.186.175.167 port 61978 ssh2
...
2020-06-27 14:18:30
18.156.153.38 attackbotsspam
Brute-force attempt banned
2020-06-27 14:17:00
148.70.186.210 attackbots
Jun 27 08:06:19 OPSO sshd\[23015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.186.210  user=root
Jun 27 08:06:21 OPSO sshd\[23015\]: Failed password for root from 148.70.186.210 port 60634 ssh2
Jun 27 08:08:02 OPSO sshd\[23598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.186.210  user=root
Jun 27 08:08:04 OPSO sshd\[23598\]: Failed password for root from 148.70.186.210 port 51166 ssh2
Jun 27 08:09:44 OPSO sshd\[23976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.186.210  user=root
2020-06-27 14:10:30
106.13.215.125 attack
Invalid user zhuang from 106.13.215.125 port 53628
2020-06-27 13:45:53
106.12.184.202 attack
$f2bV_matches
2020-06-27 14:01:56
102.133.165.93 attackspam
Jun 27 07:41:05 fhem-rasp sshd[6979]: Failed password for root from 102.133.165.93 port 25734 ssh2
Jun 27 07:41:06 fhem-rasp sshd[6979]: Disconnected from authenticating user root 102.133.165.93 port 25734 [preauth]
...
2020-06-27 13:56:27
51.158.124.238 attack
srv02 SSH BruteForce Attacks 22 ..
2020-06-27 14:04:12

Recently Reported IPs

15.229.46.76 151.157.107.10 34.60.17.161 123.239.42.49
17.164.198.76 30.92.197.25 12.74.235.26 91.18.254.158
168.29.87.148 87.241.116.5 63.201.114.152 31.138.126.4
184.241.77.91 156.223.87.159 6.24.221.183 55.200.5.186
4.220.56.153 128.183.40.135 147.202.41.185 181.112.64.41