Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.82.114.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27783
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.82.114.18.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 13:58:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
18.114.82.140.in-addr.arpa domain name pointer lb-140-82-114-18-iad.github.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.114.82.140.in-addr.arpa	name = lb-140-82-114-18-iad.github.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.159.133 attackspambots
SSH Brute Force
2020-09-09 06:45:52
112.85.42.189 attack
Sep  8 19:38:05 srv-ubuntu-dev3 sshd[47058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
Sep  8 19:38:07 srv-ubuntu-dev3 sshd[47058]: Failed password for root from 112.85.42.189 port 48952 ssh2
Sep  8 19:38:58 srv-ubuntu-dev3 sshd[47140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
Sep  8 19:39:01 srv-ubuntu-dev3 sshd[47140]: Failed password for root from 112.85.42.189 port 35626 ssh2
Sep  8 19:38:58 srv-ubuntu-dev3 sshd[47140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
Sep  8 19:39:01 srv-ubuntu-dev3 sshd[47140]: Failed password for root from 112.85.42.189 port 35626 ssh2
Sep  8 19:39:03 srv-ubuntu-dev3 sshd[47140]: Failed password for root from 112.85.42.189 port 35626 ssh2
Sep  8 19:38:58 srv-ubuntu-dev3 sshd[47140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e
...
2020-09-09 06:50:00
84.17.59.81 attackbots
fell into ViewStateTrap:nairobi
2020-09-09 06:59:18
62.210.79.233 attackspam
Automatic report - XMLRPC Attack
2020-09-09 06:37:13
157.47.24.137 attackbots
Port probing on unauthorized port 445
2020-09-09 06:29:57
85.209.0.100 attackspambots
 TCP (SYN) 85.209.0.100:6818 -> port 22, len 60
2020-09-09 06:46:31
213.145.137.102 attack
SPAM
2020-09-09 06:41:34
106.12.78.40 attack
2020-09-08T17:28:12.5665681495-001 sshd[39772]: Invalid user uucp from 106.12.78.40 port 45536
2020-09-08T17:28:14.0733571495-001 sshd[39772]: Failed password for invalid user uucp from 106.12.78.40 port 45536 ssh2
2020-09-08T17:31:15.6115771495-001 sshd[39945]: Invalid user karen from 106.12.78.40 port 37084
2020-09-08T17:31:15.6150261495-001 sshd[39945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.40
2020-09-08T17:31:15.6115771495-001 sshd[39945]: Invalid user karen from 106.12.78.40 port 37084
2020-09-08T17:31:17.5752591495-001 sshd[39945]: Failed password for invalid user karen from 106.12.78.40 port 37084 ssh2
...
2020-09-09 06:58:57
92.118.160.49 attack
Icarus honeypot on github
2020-09-09 06:36:23
46.35.19.18 attackspam
20 attempts against mh-ssh on cloud
2020-09-09 06:55:48
222.186.30.76 attackbotsspam
2020-09-08T22:58:08.618500abusebot-3.cloudsearch.cf sshd[9831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-09-08T22:58:10.899523abusebot-3.cloudsearch.cf sshd[9831]: Failed password for root from 222.186.30.76 port 33596 ssh2
2020-09-08T22:58:14.095125abusebot-3.cloudsearch.cf sshd[9831]: Failed password for root from 222.186.30.76 port 33596 ssh2
2020-09-08T22:58:08.618500abusebot-3.cloudsearch.cf sshd[9831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-09-08T22:58:10.899523abusebot-3.cloudsearch.cf sshd[9831]: Failed password for root from 222.186.30.76 port 33596 ssh2
2020-09-08T22:58:14.095125abusebot-3.cloudsearch.cf sshd[9831]: Failed password for root from 222.186.30.76 port 33596 ssh2
2020-09-08T22:58:08.618500abusebot-3.cloudsearch.cf sshd[9831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
...
2020-09-09 06:59:52
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 06:37:37
31.220.107.9 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-09-09 06:31:50
193.27.229.47 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 25682 proto: tcp cat: Misc Attackbytes: 60
2020-09-09 06:43:41
178.127.223.69 attackbots
mail auth brute force
2020-09-09 06:28:47

Recently Reported IPs

140.82.14.228 140.82.14.39 140.82.13.27 140.82.18.106
140.82.15.128 140.82.169.37 140.82.171.239 140.82.18.200
140.82.182.15 140.82.23.158 140.82.23.99 140.82.19.62
140.82.25.204 140.82.24.171 140.82.3.39 140.82.30.108
140.82.32.253 140.82.31.78 140.82.33.247 140.82.32.54