Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
219.140.118.129 attackspam
Unauthorized connection attempt detected from IP address 219.140.118.129 to port 123
2020-06-13 06:33:48
219.140.118.161 attackbots
Web Server Scan. RayID: 592cd913b8b39388, UA: Mozilla/4.066686748 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1), Country: CN
2020-05-21 03:47:57
219.140.118.20 attackbotsspam
Unauthorized connection attempt detected from IP address 219.140.118.20 to port 80 [T]
2020-01-29 09:53:19
219.140.118.186 attackspambots
Unauthorized connection attempt detected from IP address 219.140.118.186 to port 9080
2019-12-31 09:07:47
219.140.118.230 attackbotsspam
Unauthorized connection attempt detected from IP address 219.140.118.230 to port 3128
2019-12-31 08:19:35
219.140.118.171 attackbotsspam
Unauthorized connection attempt detected from IP address 219.140.118.171 to port 8081
2019-12-31 06:37:51
219.140.118.241 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 5415933c8f89e50a | WAF_Rule_ID: 1025440 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: img.skk.moe | User-Agent: Mozilla/5.0 (iPad; CPU OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 07:03:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.140.118.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22736
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.140.118.56.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:48:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 56.118.140.219.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.118.140.219.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.219.243.76 attackbotsspam
Brute force attempt
2020-08-14 17:19:35
37.49.225.166 attack
Port scanning [4 denied]
2020-08-14 17:39:40
46.180.174.134 attack
Aug 14 05:28:03 pornomens sshd\[2952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.180.174.134  user=root
Aug 14 05:28:06 pornomens sshd\[2952\]: Failed password for root from 46.180.174.134 port 61306 ssh2
Aug 14 05:34:26 pornomens sshd\[3020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.180.174.134  user=root
...
2020-08-14 17:56:03
85.95.150.143 attackbotsspam
Aug 13 23:27:29 web9 sshd\[21555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.95.150.143  user=root
Aug 13 23:27:31 web9 sshd\[21555\]: Failed password for root from 85.95.150.143 port 56754 ssh2
Aug 13 23:31:36 web9 sshd\[22161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.95.150.143  user=root
Aug 13 23:31:37 web9 sshd\[22161\]: Failed password for root from 85.95.150.143 port 34814 ssh2
Aug 13 23:35:45 web9 sshd\[22682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.95.150.143  user=root
2020-08-14 17:38:24
113.121.235.202 attackspam
Unauthorised access (Aug 14) SRC=113.121.235.202 LEN=40 TTL=49 ID=12885 TCP DPT=23 WINDOW=37070 SYN
2020-08-14 17:36:58
5.196.72.11 attackspam
Aug 14 11:01:10 [host] sshd[8993]: pam_unix(sshd:a
Aug 14 11:01:12 [host] sshd[8993]: Failed password
Aug 14 11:07:41 [host] sshd[9250]: pam_unix(sshd:a
Aug 14 11:07:43 [host] sshd[9250]: Failed password
2020-08-14 17:31:02
1.179.185.50 attackspambots
Aug 13 23:46:00 pixelmemory sshd[620196]: Failed password for root from 1.179.185.50 port 33794 ssh2
Aug 13 23:49:04 pixelmemory sshd[620772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
Aug 13 23:49:07 pixelmemory sshd[620772]: Failed password for root from 1.179.185.50 port 50762 ssh2
Aug 13 23:52:04 pixelmemory sshd[621259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.185.50  user=root
Aug 13 23:52:06 pixelmemory sshd[621259]: Failed password for root from 1.179.185.50 port 39490 ssh2
...
2020-08-14 17:18:49
106.13.184.234 attackbotsspam
Aug 14 10:16:03 amit sshd\[22670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.184.234  user=root
Aug 14 10:16:05 amit sshd\[22670\]: Failed password for root from 106.13.184.234 port 56068 ssh2
Aug 14 10:17:59 amit sshd\[23153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.184.234  user=root
...
2020-08-14 17:51:17
222.186.175.182 attackspambots
Aug 14 10:51:09 inter-technics sshd[23942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 14 10:51:12 inter-technics sshd[23942]: Failed password for root from 222.186.175.182 port 53634 ssh2
Aug 14 10:51:15 inter-technics sshd[23942]: Failed password for root from 222.186.175.182 port 53634 ssh2
Aug 14 10:51:09 inter-technics sshd[23942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 14 10:51:12 inter-technics sshd[23942]: Failed password for root from 222.186.175.182 port 53634 ssh2
Aug 14 10:51:15 inter-technics sshd[23942]: Failed password for root from 222.186.175.182 port 53634 ssh2
Aug 14 10:51:09 inter-technics sshd[23942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 14 10:51:12 inter-technics sshd[23942]: Failed password for root from 222.186.175.182 port 5363
...
2020-08-14 17:48:41
128.199.170.33 attackspambots
prod8
...
2020-08-14 17:55:31
45.55.222.162 attackbotsspam
frenzy
2020-08-14 17:39:19
206.189.200.1 attackbots
206.189.200.1 - - [14/Aug/2020:09:47:32 +0100] "POST /wp-login.php HTTP/1.1" 200 2082 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.200.1 - - [14/Aug/2020:09:47:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.200.1 - - [14/Aug/2020:09:47:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2063 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-14 17:45:34
202.155.211.226 attackspam
Aug 14 10:58:04 host sshd[6971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.155.211.226  user=root
Aug 14 10:58:06 host sshd[6971]: Failed password for root from 202.155.211.226 port 38790 ssh2
...
2020-08-14 17:19:09
118.24.118.202 attack
$lgm
2020-08-14 17:35:11
41.59.198.26 attack
Email SMTP authentication failure
2020-08-14 17:57:52

Recently Reported IPs

219.140.118.49 219.140.118.45 219.140.118.78 219.140.119.117
219.140.119.163 219.140.119.233 219.140.119.204 219.140.119.230
219.143.174.0 219.140.119.143 219.143.174.113 219.140.119.57
219.143.174.131 219.142.86.34 219.140.119.68 219.143.174.145
219.142.227.62 219.143.174.20 219.143.174.19 219.143.174.219