Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.45.197.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.45.197.218.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:24:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 218.197.45.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 140.45.197.218.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.49.227.202 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-26 05:49:25
121.200.53.164 attackbotsspam
Brute-force attempt banned
2019-11-26 05:37:15
58.181.138.119 attack
Unauthorized connection attempt from IP address 58.181.138.119 on Port 445(SMB)
2019-11-26 05:32:14
202.100.183.157 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-26 06:03:56
62.210.77.54 attackspam
port 2000/tcp
2019-11-26 05:21:05
161.10.254.124 attackspambots
Unauthorized connection attempt from IP address 161.10.254.124 on Port 445(SMB)
2019-11-26 05:22:31
45.224.105.58 attack
Nov 25 15:28:32 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=45.224.105.58, lip=10.140.194.78, TLS: Disconnected, session=
Nov 25 15:28:34 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=45.224.105.58, lip=10.140.194.78, TLS, session=
Nov 25 15:33:30 flomail dovecot: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=45.224.105.58, lip=10.140.194.78, TLS, session=
2019-11-26 05:27:31
106.75.22.216 attackspambots
11/25/2019-09:31:01.509027 106.75.22.216 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-26 05:31:39
117.50.38.202 attackspam
ssh failed login
2019-11-26 06:01:19
69.193.120.106 attackspambots
Unauthorized connection attempt from IP address 69.193.120.106 on Port 445(SMB)
2019-11-26 05:49:02
180.76.246.38 attack
Nov 25 20:08:07 jane sshd[19707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.38 
Nov 25 20:08:09 jane sshd[19707]: Failed password for invalid user ovidiu from 180.76.246.38 port 42180 ssh2
...
2019-11-26 05:36:35
35.239.184.244 attackspambots
Unauthorised access (Nov 25) SRC=35.239.184.244 LEN=40 TTL=54 ID=52760 TCP DPT=8080 WINDOW=56603 SYN
2019-11-26 05:25:24
114.5.243.55 attackbots
Spam
2019-11-26 05:27:47
177.152.159.33 attackspambots
Scan - Bot - Phishing
2019-11-26 05:58:05
212.0.155.98 attackbots
Unauthorized connection attempt from IP address 212.0.155.98 on Port 445(SMB)
2019-11-26 05:33:03

Recently Reported IPs

4.99.71.124 176.255.58.124 133.245.154.85 225.169.209.77
51.83.163.237 89.30.30.214 46.43.16.186 191.140.103.161
218.147.191.49 171.30.90.62 203.190.230.12 152.32.67.156
62.240.27.51 245.15.71.214 4.31.240.215 219.1.252.45
46.165.200.152 230.70.236.206 203.172.12.67 32.252.97.206