Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.105.192.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53174
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.105.192.140.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091302 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 08:45:57 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 140.192.105.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 140.192.105.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
221.231.211.51 attackbotsspam
1433/tcp
[2020-05-15]1pkt
2020-05-16 14:12:29
45.142.195.8 attackbotsspam
2020-05-16 05:40:00 dovecot_login authenticator failed for \(User\) \[45.142.195.8\]: 535 Incorrect authentication data \(set_id=sy@ift.org.ua\)2020-05-16 05:42:57 dovecot_login authenticator failed for \(User\) \[45.142.195.8\]: 535 Incorrect authentication data \(set_id=sb@ift.org.ua\)2020-05-16 05:45:51 dovecot_login authenticator failed for \(User\) \[45.142.195.8\]: 535 Incorrect authentication data \(set_id=rec@ift.org.ua\)
...
2020-05-16 14:25:28
178.128.57.183 attack
abasicmove.de 178.128.57.183 [08/May/2020:20:18:40 +0200] "POST /wp-login.php HTTP/1.1" 200 6094 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
abasicmove.de 178.128.57.183 [08/May/2020:20:18:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 14:41:26
35.200.183.13 attackbotsspam
...
2020-05-16 14:05:24
213.217.0.131 attackbotsspam
May 16 04:25:54 debian-2gb-nbg1-2 kernel: \[11854800.944774\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=213.217.0.131 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=43380 PROTO=TCP SPT=41194 DPT=52496 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-16 14:28:33
198.12.225.100 attack
xmlrpc attack
2020-05-16 14:44:52
157.245.104.96 attack
Total attacks: 3
2020-05-16 14:49:06
113.160.97.3 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-05-16 14:18:20
190.64.135.122 attackspam
May 13 03:43:51 firewall sshd[14420]: Invalid user mongo from 190.64.135.122
May 13 03:43:53 firewall sshd[14420]: Failed password for invalid user mongo from 190.64.135.122 port 36964 ssh2
May 13 03:51:05 firewall sshd[14580]: Invalid user ubuntu from 190.64.135.122
...
2020-05-16 14:31:32
75.119.215.210 attackbots
75.119.215.210 - - [14/May/2020:05:00:01 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
75.119.215.210 - - [14/May/2020:05:00:04 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
75.119.215.210 - - [14/May/2020:05:00:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 14:38:06
222.186.180.130 attack
05/15/2020-22:59:55.423154 222.186.180.130 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-16 14:36:05
104.245.145.21 attackspambots
(From nussbaum.velma@gmail.com) Groundbreaking new way to advertise your website for Nothing! See here: http://bit.ly/submityourfreeads
2020-05-16 14:55:55
68.202.19.86 attackspambots
May 16 01:45:42 mout sshd[23313]: Failed password for pi from 68.202.19.86 port 37720 ssh2
May 16 01:45:40 mout sshd[23313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.202.19.86  user=pi
May 16 01:45:42 mout sshd[23313]: Failed password for pi from 68.202.19.86 port 37720 ssh2
2020-05-16 14:53:09
222.186.173.142 attack
May 16 04:53:34 santamaria sshd\[13577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
May 16 04:53:37 santamaria sshd\[13577\]: Failed password for root from 222.186.173.142 port 24164 ssh2
May 16 04:53:40 santamaria sshd\[13577\]: Failed password for root from 222.186.173.142 port 24164 ssh2
...
2020-05-16 14:26:38
93.174.93.195 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 87 - port: 40718 proto: UDP cat: Misc Attack
2020-05-16 14:06:54

Recently Reported IPs

140.72.245.149 63.33.200.53 248.249.3.100 185.232.55.137
198.68.43.47 177.25.217.96 141.170.83.73 234.152.114.1
50.160.205.16 10.211.88.46 83.93.75.224 209.58.142.154
179.138.22.16 113.227.132.91 246.235.127.123 5.255.51.250
44.138.132.35 218.209.204.222 164.68.124.211 212.177.55.90