Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.140.195.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.140.195.112.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025073001 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 31 12:46:09 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 112.195.140.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.195.140.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.175.59.225 attackbots
Invalid user id from 134.175.59.225 port 36324
2020-04-22 00:59:26
200.37.197.130 attackbotsspam
frenzy
2020-04-22 00:36:07
218.88.164.159 attackbots
Invalid user ian from 218.88.164.159 port 58771
2020-04-22 00:27:41
131.196.111.81 attack
Invalid user content from 131.196.111.81 port 5385
2020-04-22 01:00:06
195.214.223.84 attackbotsspam
(sshd) Failed SSH login from 195.214.223.84 (UA/Ukraine/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 19:22:30 srv sshd[28611]: Invalid user xz from 195.214.223.84 port 51130
Apr 21 19:22:33 srv sshd[28611]: Failed password for invalid user xz from 195.214.223.84 port 51130 ssh2
Apr 21 19:29:00 srv sshd[28761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.214.223.84  user=root
Apr 21 19:29:02 srv sshd[28761]: Failed password for root from 195.214.223.84 port 54946 ssh2
Apr 21 19:31:35 srv sshd[28831]: Invalid user ir from 195.214.223.84 port 59882
2020-04-22 00:37:17
138.68.4.8 attack
Invalid user r from 138.68.4.8 port 38076
2020-04-22 00:58:59
206.81.12.209 attackspam
Apr 21 17:55:52 [host] sshd[5879]: Invalid user do
Apr 21 17:55:52 [host] sshd[5879]: pam_unix(sshd:a
Apr 21 17:55:54 [host] sshd[5879]: Failed password
2020-04-22 00:32:08
1.71.129.49 attack
Invalid user pb from 1.71.129.49 port 49935
2020-04-22 00:23:15
175.24.109.49 attack
SSH Brute-Force. Ports scanning.
2020-04-22 00:48:59
157.230.2.208 attackbots
Apr 21 17:45:06 163-172-32-151 sshd[10090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.2.208  user=root
Apr 21 17:45:08 163-172-32-151 sshd[10090]: Failed password for root from 157.230.2.208 port 44406 ssh2
...
2020-04-22 00:52:01
192.241.202.169 attack
prod11
...
2020-04-22 00:38:18
148.66.132.190 attack
Invalid user postgres from 148.66.132.190 port 53582
2020-04-22 00:54:28
197.248.96.70 attackbotsspam
Invalid user james from 197.248.96.70 port 14601
2020-04-22 00:36:24
150.136.154.228 attackbots
Invalid user postgres from 150.136.154.228 port 29192
2020-04-22 00:54:14
218.80.229.142 attackspambots
Invalid user postgres from 218.80.229.142 port 36617
2020-04-22 00:27:58

Recently Reported IPs

91.231.89.134 91.231.89.12 91.231.89.110 56.218.76.183
42.71.167.116 40.182.28.186 30.234.40.226 41.82.177.22
91.106.42.234 35.203.210.76 113.110.201.165 8.220.180.85
185.141.219.213 154.161.26.244 158.6.140.191 158.107.216.130
153.23.245.92 148.55.204.127 217.160.48.108 194.87.84.195