Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.92.28.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.92.28.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 17:12:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 114.28.92.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 114.28.92.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.202.48.251 attack
Apr  9 20:59:07 gw1 sshd[27031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.202.48.251
Apr  9 20:59:09 gw1 sshd[27031]: Failed password for invalid user user from 122.202.48.251 port 42100 ssh2
...
2020-04-10 04:10:33
213.176.34.76 attackbots
2020-04-09T21:17:54.518161v22018076590370373 sshd[5019]: Failed password for root from 213.176.34.76 port 38496 ssh2
2020-04-09T21:22:53.790487v22018076590370373 sshd[21479]: Invalid user user from 213.176.34.76 port 39268
2020-04-09T21:22:53.796956v22018076590370373 sshd[21479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.176.34.76
2020-04-09T21:22:53.790487v22018076590370373 sshd[21479]: Invalid user user from 213.176.34.76 port 39268
2020-04-09T21:22:55.697962v22018076590370373 sshd[21479]: Failed password for invalid user user from 213.176.34.76 port 39268 ssh2
...
2020-04-10 04:13:29
222.186.175.202 attack
2020-04-09T19:43:44.252437abusebot-4.cloudsearch.cf sshd[30527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-04-09T19:43:46.558565abusebot-4.cloudsearch.cf sshd[30527]: Failed password for root from 222.186.175.202 port 32182 ssh2
2020-04-09T19:43:49.815574abusebot-4.cloudsearch.cf sshd[30527]: Failed password for root from 222.186.175.202 port 32182 ssh2
2020-04-09T19:43:44.252437abusebot-4.cloudsearch.cf sshd[30527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-04-09T19:43:46.558565abusebot-4.cloudsearch.cf sshd[30527]: Failed password for root from 222.186.175.202 port 32182 ssh2
2020-04-09T19:43:49.815574abusebot-4.cloudsearch.cf sshd[30527]: Failed password for root from 222.186.175.202 port 32182 ssh2
2020-04-09T19:43:44.252437abusebot-4.cloudsearch.cf sshd[30527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2020-04-10 03:52:51
200.0.236.210 attackbotsspam
Apr  9 14:57:30 nextcloud sshd\[5975\]: Invalid user admin from 200.0.236.210
Apr  9 14:57:30 nextcloud sshd\[5975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.0.236.210
Apr  9 14:57:32 nextcloud sshd\[5975\]: Failed password for invalid user admin from 200.0.236.210 port 52078 ssh2
2020-04-10 04:18:58
45.224.105.41 attackbots
(imapd) Failed IMAP login from 45.224.105.41 (AR/Argentina/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr 10 00:26:26 ir1 dovecot[566034]: imap-login: Disconnected (auth failed, 1 attempts in 27 secs): user=, method=PLAIN, rip=45.224.105.41, lip=5.63.12.44, TLS: Connection closed, session=
2020-04-10 04:12:13
121.134.102.231 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-04-10 03:54:40
222.186.42.75 attackbotsspam
Apr  9 19:29:58 marvibiene sshd[30494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=root
Apr  9 19:30:00 marvibiene sshd[30494]: Failed password for root from 222.186.42.75 port 57315 ssh2
Apr  9 19:30:02 marvibiene sshd[30494]: Failed password for root from 222.186.42.75 port 57315 ssh2
Apr  9 19:29:58 marvibiene sshd[30494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.75  user=root
Apr  9 19:30:00 marvibiene sshd[30494]: Failed password for root from 222.186.42.75 port 57315 ssh2
Apr  9 19:30:02 marvibiene sshd[30494]: Failed password for root from 222.186.42.75 port 57315 ssh2
...
2020-04-10 03:45:22
129.226.67.136 attackspambots
Brute-force attempt banned
2020-04-10 04:14:02
114.69.249.194 attack
Apr  9 19:38:53 vps333114 sshd[531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.69.249.194
Apr  9 19:38:55 vps333114 sshd[531]: Failed password for invalid user radware from 114.69.249.194 port 33042 ssh2
...
2020-04-10 03:47:36
193.107.75.42 attack
Apr  9 19:30:57 game-panel sshd[21644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.107.75.42
Apr  9 19:30:59 game-panel sshd[21644]: Failed password for invalid user user22 from 193.107.75.42 port 53708 ssh2
Apr  9 19:34:32 game-panel sshd[21852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.107.75.42
2020-04-10 03:54:53
190.64.213.155 attack
k+ssh-bruteforce
2020-04-10 04:24:14
182.61.21.155 attack
Apr  9 15:19:56 lock-38 sshd[782574]: Invalid user research from 182.61.21.155 port 42516
Apr  9 15:19:56 lock-38 sshd[782574]: Failed password for invalid user research from 182.61.21.155 port 42516 ssh2
Apr  9 15:23:20 lock-38 sshd[782692]: Invalid user deploy from 182.61.21.155 port 54674
Apr  9 15:23:20 lock-38 sshd[782692]: Invalid user deploy from 182.61.21.155 port 54674
Apr  9 15:23:20 lock-38 sshd[782692]: Failed password for invalid user deploy from 182.61.21.155 port 54674 ssh2
...
2020-04-10 04:19:10
49.88.112.68 attackspam
Apr  9 22:11:55 v22018053744266470 sshd[26493]: Failed password for root from 49.88.112.68 port 33898 ssh2
Apr  9 22:13:01 v22018053744266470 sshd[26562]: Failed password for root from 49.88.112.68 port 10675 ssh2
...
2020-04-10 04:19:56
120.26.95.190 attackbotsspam
WordPress wp-login brute force :: 120.26.95.190 0.112 - [09/Apr/2020:16:08:42  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1804 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-04-10 04:16:43
183.89.214.223 attack
Dovecot Invalid User Login Attempt.
2020-04-10 03:52:09

Recently Reported IPs

195.153.206.63 204.87.138.19 26.202.12.83 103.181.113.173
75.98.170.209 66.160.37.115 14.27.59.85 48.183.246.240
246.54.95.48 132.180.38.203 8.176.149.220 96.6.116.28
150.60.197.151 172.152.224.161 33.220.227.1 251.249.54.246
32.16.185.13 156.200.191.93 95.130.102.60 96.183.1.115