Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gaziantep

Region: Gaziantep

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: National Academic Network and Information Center

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.140.136.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43896
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.140.136.113.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 03:47:34 CST 2019
;; MSG SIZE  rcvd: 119

Host info
113.136.140.193.in-addr.arpa domain name pointer mds13.bim.gantep.edu.tr.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
113.136.140.193.in-addr.arpa	name = mds13.bim.gantep.edu.tr.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
181.221.192.113 attack
Dec  3 05:12:40 zeus sshd[23828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 
Dec  3 05:12:42 zeus sshd[23828]: Failed password for invalid user payen from 181.221.192.113 port 41745 ssh2
Dec  3 05:21:35 zeus sshd[23984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.221.192.113 
Dec  3 05:21:37 zeus sshd[23984]: Failed password for invalid user rajnai from 181.221.192.113 port 47438 ssh2
2019-12-03 14:16:36
112.85.42.185 attackbotsspam
2019-12-03T07:56:35.541686scmdmz1 sshd\[21697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
2019-12-03T07:56:37.321879scmdmz1 sshd\[21697\]: Failed password for root from 112.85.42.185 port 47498 ssh2
2019-12-03T07:56:39.282295scmdmz1 sshd\[21697\]: Failed password for root from 112.85.42.185 port 47498 ssh2
...
2019-12-03 15:02:29
222.186.175.155 attackbotsspam
Dec  3 07:46:52 SilenceServices sshd[14923]: Failed password for root from 222.186.175.155 port 37896 ssh2
Dec  3 07:47:01 SilenceServices sshd[14923]: Failed password for root from 222.186.175.155 port 37896 ssh2
Dec  3 07:47:05 SilenceServices sshd[14923]: Failed password for root from 222.186.175.155 port 37896 ssh2
Dec  3 07:47:05 SilenceServices sshd[14923]: error: maximum authentication attempts exceeded for root from 222.186.175.155 port 37896 ssh2 [preauth]
2019-12-03 14:54:00
222.186.173.183 attack
$f2bV_matches
2019-12-03 14:48:49
49.88.112.111 attackbots
Dec  3 02:56:57 firewall sshd[28654]: Failed password for root from 49.88.112.111 port 16536 ssh2
Dec  3 02:57:47 firewall sshd[28675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Dec  3 02:57:49 firewall sshd[28675]: Failed password for root from 49.88.112.111 port 29285 ssh2
...
2019-12-03 14:16:04
206.189.222.181 attackspam
2019-12-03T05:57:00.938256shield sshd\[13614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181  user=root
2019-12-03T05:57:03.266157shield sshd\[13614\]: Failed password for root from 206.189.222.181 port 33332 ssh2
2019-12-03T06:02:50.312919shield sshd\[15141\]: Invalid user tadao from 206.189.222.181 port 43436
2019-12-03T06:02:50.317350shield sshd\[15141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.222.181
2019-12-03T06:02:52.363695shield sshd\[15141\]: Failed password for invalid user tadao from 206.189.222.181 port 43436 ssh2
2019-12-03 14:19:26
49.51.242.196 attackspam
7071/tcp 64210/tcp 505/tcp...
[2019-10-17/12-03]4pkt,4pt.(tcp)
2019-12-03 14:29:13
139.155.26.91 attackspam
Dec  2 20:16:45 php1 sshd\[25524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91  user=root
Dec  2 20:16:47 php1 sshd\[25524\]: Failed password for root from 139.155.26.91 port 46970 ssh2
Dec  2 20:23:50 php1 sshd\[26392\]: Invalid user muni from 139.155.26.91
Dec  2 20:23:50 php1 sshd\[26392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91
Dec  2 20:23:52 php1 sshd\[26392\]: Failed password for invalid user muni from 139.155.26.91 port 53846 ssh2
2019-12-03 14:25:19
144.121.28.206 attackbots
Dec  3 07:29:56 MK-Soft-VM3 sshd[2046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.121.28.206 
Dec  3 07:29:59 MK-Soft-VM3 sshd[2046]: Failed password for invalid user poeschko from 144.121.28.206 port 6126 ssh2
...
2019-12-03 14:51:37
198.108.66.183 attack
16992/tcp 11211/tcp 47808/udp...
[2019-10-06/12-02]11pkt,4pt.(tcp),2pt.(udp),2tp.(icmp)
2019-12-03 14:21:54
129.213.100.212 attack
Dec  3 01:43:40 plusreed sshd[6778]: Invalid user raza from 129.213.100.212
...
2019-12-03 14:58:43
129.211.147.91 attack
2019-12-03T06:29:54.487295abusebot-8.cloudsearch.cf sshd\[14678\]: Invalid user webadmin from 129.211.147.91 port 59586
2019-12-03 14:55:39
134.228.154.244 attackspambots
Automatic report - Port Scan Attack
2019-12-03 14:40:40
124.233.2.82 attackbotsspam
firewall-block, port(s): 1433/tcp
2019-12-03 14:48:18
119.235.249.60 attack
DDOS attack on ICMP using random ports.
2019-12-03 14:22:27

Recently Reported IPs

78.152.116.182 178.59.244.115 199.22.101.170 216.44.26.101
65.66.218.230 73.98.173.176 34.220.118.162 39.41.97.198
141.91.86.237 2.20.98.226 194.128.151.109 76.249.49.189
139.193.206.160 218.190.51.106 36.104.71.117 112.122.63.29
44.227.32.126 82.130.199.50 24.168.101.186 200.68.142.51