Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.4.149.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26496
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.4.149.102.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052401 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 25 04:11:04 CST 2024
;; MSG SIZE  rcvd: 106
Host info
b'Host 102.149.4.140.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 140.4.149.102.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
103.228.112.45 attackbotsspam
Nov  1 16:42:44 legacy sshd[27730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.45
Nov  1 16:42:46 legacy sshd[27730]: Failed password for invalid user P4sswOrd from 103.228.112.45 port 59872 ssh2
Nov  1 16:48:49 legacy sshd[27907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.45
...
2019-11-02 02:05:41
46.229.168.147 attackspam
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2019-11-02 01:58:23
211.75.194.80 attack
Nov  1 17:54:32 MK-Soft-VM3 sshd[15915]: Failed password for root from 211.75.194.80 port 43864 ssh2
...
2019-11-02 02:09:16
212.129.52.3 attackspam
Nov  1 13:56:22 vps647732 sshd[14020]: Failed password for root from 212.129.52.3 port 22979 ssh2
...
2019-11-02 02:11:07
47.240.35.14 attack
" "
2019-11-02 02:10:18
76.2.113.4 attackbots
11/01/2019-07:46:25.025762 76.2.113.4 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-02 02:12:08
194.182.84.105 attackbotsspam
Nov  1 14:22:23 ns381471 sshd[24061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.84.105
Nov  1 14:22:25 ns381471 sshd[24061]: Failed password for invalid user chinni from 194.182.84.105 port 50872 ssh2
2019-11-02 02:04:50
170.0.128.10 attack
Automatic report - Banned IP Access
2019-11-02 02:26:10
122.225.76.214 attackspambots
Unauthorized connection attempt from IP address 122.225.76.214 on Port 445(SMB)
2019-11-02 02:01:17
103.60.126.65 attackspambots
Invalid user muhammad from 103.60.126.65 port 15086
2019-11-02 01:58:05
192.95.3.151 attack
Automatic report - Port Scan
2019-11-02 02:13:08
172.96.9.37 attack
2019-11-01 12:46:02,361 fail2ban.actions: WARNING [postfix] Ban 172.96.9.37
2019-11-02 02:33:16
114.34.233.25 attack
Unauthorized connection attempt from IP address 114.34.233.25 on Port 445(SMB)
2019-11-02 02:37:10
14.170.234.99 attack
Unauthorized connection attempt from IP address 14.170.234.99 on Port 445(SMB)
2019-11-02 02:06:23
196.37.220.94 attackspambots
Unauthorized connection attempt from IP address 196.37.220.94 on Port 445(SMB)
2019-11-02 02:30:00

Recently Reported IPs

145.114.210.2 212.186.64.72 156.8.26.145 12.248.151.100
52.89.27.138 59.157.84.87 82.215.24.141 25.183.187.186
130.54.222.211 23.225.121.188 244.130.183.141 113.243.61.138
173.251.121.9 9.61.192.75 129.70.212.203 62.123.165.44
73.15.80.51 168.88.34.127 90.44.187.113 206.199.32.138