Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.140.60.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60109
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.140.60.140.			IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:38:15 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 140.60.140.213.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 140.60.140.213.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
104.248.253.82 attack
Automatic report - Web App Attack
2019-07-08 18:34:44
176.31.71.121 attackspam
Automatic report - Web App Attack
2019-07-08 19:16:45
120.52.152.15 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-07-08 18:36:44
191.53.236.157 attackbots
SMTP Fraud Orders
2019-07-08 18:28:34
5.89.10.81 attackspam
Jul  8 02:14:08 typhoon sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:14:10 typhoon sshd[8921]: Failed password for invalid user monika from 5.89.10.81 port 48222 ssh2
Jul  8 02:14:10 typhoon sshd[8921]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth]
Jul  8 02:16:45 typhoon sshd[8930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:16:48 typhoon sshd[8930]: Failed password for invalid user ftpuser from 5.89.10.81 port 39316 ssh2
Jul  8 02:16:48 typhoon sshd[8930]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth]
Jul  8 02:19:05 typhoon sshd[8977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:19:07 typhoon sshd[8977]: Failed password for invalid user ajmal from 5.........
-------------------------------
2019-07-08 18:47:09
17.133.234.33 attackspambots
24
2019-07-08 16:53:33
notice
Firewall
Match default rule, DROP [count=12]
17.133.234.33:16387
192.168.3.108:16403
ACCESS BLOCK
2019-07-08 19:05:20
89.248.172.85 attackbots
abuse-sasl
2019-07-08 18:28:04
27.109.17.18 attackspambots
ssh failed login
2019-07-08 18:49:46
131.255.223.73 attackspambots
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 19:14:50
123.30.240.121 attackbots
Jul  8 11:12:40 * sshd[1471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.240.121
Jul  8 11:12:42 * sshd[1471]: Failed password for invalid user radio from 123.30.240.121 port 44316 ssh2
2019-07-08 19:17:21
81.22.45.32 attackbotsspam
Multiport scan : 76 ports scanned 2222 3000 3322 3333 3344 3350 3355 3366 3369 3370 3372 3377 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388 3390 3391 3392 3394 3395 3396 3397 3398 3399 3400 3401 3402 3403 3404 3489 3492 3500 3589 3889 3900 4000 4001 4002 4003 4005 4006 4007 4100 4200 4389 4400 4444 4489 4490 4499 5000 5001 5389 5555 5589 6000 6666 7000 7777 8000 8888 9000 9833 9999 13389 23389 33389 43389 63389
2019-07-08 18:48:07
5.150.239.78 attackbotsspam
DATE:2019-07-08_10:24:49, IP:5.150.239.78, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-08 19:16:08
131.255.220.180 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 19:19:46
64.57.81.165 attack
Jul  8 10:08:19 mxgate1 postfix/postscreen[24361]: CONNECT from [64.57.81.165]:56898 to [176.31.12.44]:25
Jul  8 10:08:19 mxgate1 postfix/dnsblog[24397]: addr 64.57.81.165 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  8 10:08:24 mxgate1 postfix/dnsblog[24396]: addr 64.57.81.165 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  8 10:08:24 mxgate1 postfix/dnsblog[24364]: addr 64.57.81.165 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  8 10:08:25 mxgate1 postfix/postscreen[24361]: DNSBL rank 4 for [64.57.81.165]:56898
Jul x@x
Jul  8 10:08:26 mxgate1 postfix/postscreen[24361]: DISCONNECT [64.57.81.165]:56898


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=64.57.81.165
2019-07-08 19:10:07
114.225.199.34 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-08 19:10:39

Recently Reported IPs

213.141.153.146 213.141.68.32 213.142.136.107 213.142.143.99
213.142.136.40 213.142.145.49 213.142.138.63 213.140.61.230
213.142.149.234 213.143.3.43 213.144.102.3 213.143.192.173
213.144.123.125 213.144.27.104 213.144.16.20 213.144.14.137
213.144.5.237 213.145.129.26 213.145.129.22 213.145.140.245