Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: CenturyLink Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 206.157.134.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36240
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;206.157.134.140.		IN	A

;; AUTHORITY SECTION:
.			1410	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052100 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 22 00:30:53 CST 2019
;; MSG SIZE  rcvd: 119

Host info
Host 140.134.157.206.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 140.134.157.206.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.203 attackbots
Jun 21 13:11:00 dev sshd\[30929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
Jun 21 13:11:02 dev sshd\[30929\]: Failed password for root from 218.92.0.203 port 45794 ssh2
...
2019-06-21 23:18:33
93.177.147.50 attackspam
PHI,WP GET /wp-login.php
2019-06-21 23:02:30
218.87.168.228 attack
23/tcp 23/tcp
[2019-06-21]2pkt
2019-06-21 22:55:24
14.186.234.22 attackspambots
81/tcp
[2019-06-21]1pkt
2019-06-21 23:16:21
174.101.80.233 attackbotsspam
SSH Bruteforce Attack
2019-06-21 23:01:25
62.219.128.221 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-21 22:31:57
122.116.212.188 attackbots
23/tcp
[2019-06-21]1pkt
2019-06-21 23:25:50
58.150.179.133 attackspam
RDP brute forcing (d)
2019-06-21 23:09:52
109.245.159.186 attackbotsspam
Autoban   109.245.159.186 AUTH/CONNECT
2019-06-21 22:37:32
109.130.134.98 attackbotsspam
20 attempts against mh-ssh on comet.magehost.pro
2019-06-21 22:56:53
196.54.65.155 attack
Spammer
2019-06-21 23:42:30
221.9.148.169 attack
23/tcp
[2019-06-21]1pkt
2019-06-21 23:44:56
123.16.222.88 attack
139/tcp
[2019-06-21]1pkt
2019-06-21 23:17:06
103.82.80.52 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:11:18]
2019-06-21 22:45:34
206.189.197.48 attackspam
2019-06-21T21:11:36.080681enmeeting.mahidol.ac.th sshd\[28531\]: Invalid user techiweb from 206.189.197.48 port 53036
2019-06-21T21:11:36.096060enmeeting.mahidol.ac.th sshd\[28531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.197.48
2019-06-21T21:11:38.582000enmeeting.mahidol.ac.th sshd\[28531\]: Failed password for invalid user techiweb from 206.189.197.48 port 53036 ssh2
...
2019-06-21 22:46:27

Recently Reported IPs

86.66.170.204 138.92.207.18 78.85.48.103 205.64.151.240
24.244.157.7 144.37.64.165 117.86.33.87 97.199.23.183
12.58.124.102 119.74.194.119 195.226.129.230 117.1.84.29
40.44.228.171 86.63.61.63 109.86.183.249 4.176.152.151
69.220.127.38 185.222.209.97 161.174.196.189 171.226.34.162