Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: MyRepublic Ltd.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Aug 10 06:25:12 takio sshd[21711]: Invalid user ubnt from 158.140.137.132 port 55631
Aug 10 06:37:34 takio sshd[22077]: Invalid user ubuntu from 158.140.137.132 port 56027
Aug 10 06:49:55 takio sshd[23134]: Invalid user osmc from 158.140.137.132 port 56430
2020-08-10 18:05:19
attackbotsspam
[Aegis] @ 2019-08-31 22:44:46  0100 -> SSH insecure connection attempt (scan).
2019-09-01 12:48:41
Comments on same subnet:
IP Type Details Datetime
158.140.137.39 attack
IMAP
2020-06-26 03:01:13
158.140.137.39 attackbotsspam
2020-06-20 22:04:38 Unauthorized connection attempt to IMAP/POP
2020-06-21 16:28:26
158.140.137.39 attackbots
Dovecot Invalid User Login Attempt.
2020-06-19 13:51:28
158.140.137.3 attackbots
#4701 - [158.140.137.39] Closing connection (IP still banned)
#4701 - [158.140.137.39] Closing connection (IP still banned)
#4701 - [158.140.137.39] Closing connection (IP still banned)
#4701 - [158.140.137.39] Closing connection (IP still banned)

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=158.140.137.3
2020-05-26 23:24:41
158.140.137.39 attackbots
(imapd) Failed IMAP login from 158.140.137.39 (SG/Singapore/39-137-140-158.myrepublic.com.sg): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 25 22:15:32 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 5 secs): user=, method=PLAIN, rip=158.140.137.39, lip=5.63.12.44, TLS, session=
2020-05-26 01:53:06
158.140.137.39 attackbotsspam
$f2bV_matches
2020-02-23 07:49:38
158.140.137.97 attackbotsspam
unauthorized connection attempt
2020-01-25 13:59:46
158.140.137.39 attackspambots
Dovecot Brute-Force
2019-10-05 16:27:06
158.140.137.39 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-09-22 23:53:22
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.140.137.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3268
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.140.137.132.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083102 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 01 12:48:33 CST 2019
;; MSG SIZE  rcvd: 119
Host info
132.137.140.158.in-addr.arpa domain name pointer 132-137-140-158.myrepublic.com.sg.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
132.137.140.158.in-addr.arpa	name = 132-137-140-158.myrepublic.com.sg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
141.212.123.189 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-03 23:57:21
186.206.129.160 attackspam
Sep  3 17:05:31 markkoudstaal sshd[30344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.206.129.160
Sep  3 17:05:33 markkoudstaal sshd[30344]: Failed password for invalid user alex from 186.206.129.160 port 60701 ssh2
Sep  3 17:11:05 markkoudstaal sshd[31985]: Failed password for root from 186.206.129.160 port 36105 ssh2
...
2020-09-04 00:33:31
95.71.224.160 attackspam
Attempted connection to port 445.
2020-09-04 00:00:46
213.59.204.250 attack
Unauthorized connection attempt from IP address 213.59.204.250 on Port 445(SMB)
2020-09-04 00:27:34
200.44.203.249 attackbotsspam
Unauthorized connection attempt from IP address 200.44.203.249 on Port 445(SMB)
2020-09-03 23:54:56
61.181.80.253 attackspam
Invalid user rob from 61.181.80.253 port 44293
2020-09-04 00:21:58
189.219.77.32 attackbots
Unauthorized connection attempt from IP address 189.219.77.32 on Port 445(SMB)
2020-09-04 00:25:51
188.234.247.110 attackbots
SSH invalid-user multiple login attempts
2020-09-04 00:24:56
113.190.40.199 attackspambots
scans once in preceeding hours on the ports (in chronological order) 30443 resulting in total of 1 scans from 113.160.0.0/11 block.
2020-09-04 00:22:46
106.104.84.50 attackbots
Port probing on unauthorized port 445
2020-09-04 00:28:17
201.91.44.206 attackbotsspam
Unauthorized connection attempt from IP address 201.91.44.206 on Port 445(SMB)
2020-09-04 00:02:33
176.236.83.66 attack
Unauthorized connection attempt detected from IP address 176.236.83.66 to port 23 [T]
2020-09-04 00:19:49
66.215.24.31 attackbots
Attempted connection to port 5555.
2020-09-04 00:01:45
46.21.198.186 attackbotsspam
03.09.2020 15:54:36 - Wordpress fail 
Detected by ELinOX-ALM
2020-09-04 00:15:06
51.38.57.78 attack
Sep  4 01:40:25 localhost sshd[4144140]: Connection closed by 51.38.57.78 port 59648 [preauth]
...
2020-09-04 00:11:22

Recently Reported IPs

129.226.76.114 217.10.102.82 82.115.215.86 209.97.174.183
122.141.141.64 103.121.26.150 196.56.65.94 221.237.152.171
61.236.250.29 187.101.235.10 79.55.14.4 70.218.190.221
215.96.104.62 33.163.232.244 31.73.186.68 88.52.164.5
13.80.91.189 128.247.8.123 146.144.94.71 89.35.253.220