Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yilan

Region: Ilan

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.96.158.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33312
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.96.158.142.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 15:55:25 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 142.158.96.140.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.158.96.140.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.67 attackspam
Aug  7 11:53:35 dns1 sshd[9353]: Failed password for root from 49.88.112.67 port 20464 ssh2
Aug  7 11:53:39 dns1 sshd[9353]: Failed password for root from 49.88.112.67 port 20464 ssh2
Aug  7 11:53:42 dns1 sshd[9353]: Failed password for root from 49.88.112.67 port 20464 ssh2
2020-08-07 23:42:32
201.156.169.109 attackspambots
Automatic report - Banned IP Access
2020-08-07 23:32:35
101.132.64.225 attackbotsspam
Aug  7 13:14:42 myhostname sshd[32211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.132.64.225  user=r.r
Aug  7 13:14:43 myhostname sshd[32211]: Failed password for r.r from 101.132.64.225 port 54158 ssh2
Aug  7 13:14:44 myhostname sshd[32211]: Received disconnect from 101.132.64.225 port 54158:11: Bye Bye [preauth]
Aug  7 13:14:44 myhostname sshd[32211]: Disconnected from 101.132.64.225 port 54158 [preauth]
Aug  7 13:41:28 myhostname sshd[19073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.132.64.225  user=r.r
Aug  7 13:41:30 myhostname sshd[19073]: Failed password for r.r from 101.132.64.225 port 52746 ssh2
Aug  7 13:41:30 myhostname sshd[19073]: Received disconnect from 101.132.64.225 port 52746:11: Bye Bye [preauth]
Aug  7 13:41:30 myhostname sshd[19073]: Disconnected from 101.132.64.225 port 52746 [preauth]
Aug  7 13:42:47 myhostname sshd[19978]: pam_unix(sshd:auth): aut........
-------------------------------
2020-08-07 23:43:15
129.211.123.97 attackspam
Port Scan/VNC login attempt
...
2020-08-07 23:28:29
77.27.168.117 attackspam
2020-08-07T14:59:53.618017amanda2.illicoweb.com sshd\[4367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.168.27.77.dynamic.reverse-mundo-r.com  user=root
2020-08-07T14:59:55.585115amanda2.illicoweb.com sshd\[4367\]: Failed password for root from 77.27.168.117 port 35302 ssh2
2020-08-07T15:03:10.047002amanda2.illicoweb.com sshd\[4910\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.168.27.77.dynamic.reverse-mundo-r.com  user=root
2020-08-07T15:03:11.727846amanda2.illicoweb.com sshd\[4910\]: Failed password for root from 77.27.168.117 port 35046 ssh2
2020-08-07T15:05:08.889571amanda2.illicoweb.com sshd\[5291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.168.27.77.dynamic.reverse-mundo-r.com  user=root
...
2020-08-07 23:58:13
208.113.153.216 attackbots
208.113.153.216 - - [07/Aug/2020:15:33:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.113.153.216 - - [07/Aug/2020:15:33:17 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.113.153.216 - - [07/Aug/2020:15:33:18 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 23:50:33
66.96.235.110 attackbots
Aug 7 16:54:01 *hidden* sshd[14026]: Failed password for *hidden* from 66.96.235.110 port 35194 ssh2 Aug 7 16:55:18 *hidden* sshd[14342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.235.110 user=root Aug 7 16:55:20 *hidden* sshd[14342]: Failed password for *hidden* from 66.96.235.110 port 53794 ssh2
2020-08-07 23:27:39
87.103.120.250 attack
2020-08-07T13:59:19.927955shield sshd\[9741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.120.103.87.rev.vodafone.pt  user=root
2020-08-07T13:59:22.451024shield sshd\[9741\]: Failed password for root from 87.103.120.250 port 46382 ssh2
2020-08-07T14:03:27.511076shield sshd\[10065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.120.103.87.rev.vodafone.pt  user=root
2020-08-07T14:03:29.080690shield sshd\[10065\]: Failed password for root from 87.103.120.250 port 56812 ssh2
2020-08-07T14:07:42.938688shield sshd\[10483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=250.120.103.87.rev.vodafone.pt  user=root
2020-08-07 23:32:17
110.77.149.220 attackspam
Dovecot Invalid User Login Attempt.
2020-08-07 23:26:44
194.170.156.9 attackbots
2020-08-07T16:59:16.737955amanda2.illicoweb.com sshd\[24312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
2020-08-07T16:59:18.728823amanda2.illicoweb.com sshd\[24312\]: Failed password for root from 194.170.156.9 port 42849 ssh2
2020-08-07T17:02:38.221261amanda2.illicoweb.com sshd\[24941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
2020-08-07T17:02:40.608652amanda2.illicoweb.com sshd\[24941\]: Failed password for root from 194.170.156.9 port 41945 ssh2
2020-08-07T17:04:44.168680amanda2.illicoweb.com sshd\[25192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.170.156.9  user=root
...
2020-08-07 23:51:35
72.166.243.197 attack
SSH invalid-user multiple login try
2020-08-08 00:01:53
45.129.33.10 attack
[H1.VM6] Blocked by UFW
2020-08-07 23:25:46
51.38.245.44 attackspam
(cpanel) Failed cPanel login from 51.38.245.44 (FR/France/-/-/shcl-ced68.serverlet.com/[AS16276 OVH SAS]): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: [2020-08-07 12:05:09 +0000] info [cpaneld] 51.38.245.44 - aichkg "POST /login/?login_only=1 HTTP/1.1" FAILED LOGIN cpaneld: access denied for root, reseller, and user password
2020-08-07 23:40:32
118.69.108.35 attackspam
118.69.108.35 - - [07/Aug/2020:15:47:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2305 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.69.108.35 - - [07/Aug/2020:15:47:43 +0100] "POST /wp-login.php HTTP/1.1" 200 2329 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.69.108.35 - - [07/Aug/2020:15:47:44 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 23:42:02
103.98.176.188 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-07T11:55:39Z and 2020-08-07T12:04:55Z
2020-08-08 00:00:09

Recently Reported IPs

140.116.47.40 176.227.233.159 130.216.95.212 136.152.143.125
129.13.67.2 124.16.189.61 133.17.5.17 140.116.112.6
140.120.63.56 168.131.35.111 140.116.122.229 165.123.231.105
137.189.43.17 10.6.65.249 140.116.96.116 140.113.151.165
140.116.183.105 143.248.173.21 120.113.200.113 131.155.34.233