Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
219.140.119.44 attackspambots
219.140.119.44 - - \[31/Jan/2020:10:43:47 +0200\] "GET http://www.rfa.org/english/ HTTP/1.1" 404 206 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/45.0.2454.101 Safari/537.36"
2020-01-31 22:39:59
219.140.119.231 attackbots
Unauthorized connection attempt detected from IP address 219.140.119.231 to port 8082 [J]
2020-01-29 07:49:39
219.140.119.139 attack
Unauthorized connection attempt detected from IP address 219.140.119.139 to port 80 [J]
2020-01-14 15:03:45
219.140.119.159 attackspambots
Unauthorized connection attempt detected from IP address 219.140.119.159 to port 2053
2019-12-31 06:17:35
219.140.119.132 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54315a9eca57e82d | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.096783921 Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 05:31:12
219.140.119.250 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54160cf68976996b | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:06:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.140.119.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.140.119.20.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:05:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 20.119.140.219.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.119.140.219.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.228.32.220 attackbotsspam
Automatic report - Port Scan Attack
2020-04-04 05:45:58
106.51.80.198 attackbots
Apr  3 23:41:54 ns3164893 sshd[2736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.80.198  user=root
Apr  3 23:41:55 ns3164893 sshd[2736]: Failed password for root from 106.51.80.198 port 41072 ssh2
...
2020-04-04 05:50:25
159.65.41.159 attackbots
SSH Invalid Login
2020-04-04 05:53:42
173.249.60.88 attackspambots
firewall-block, port(s): 69/udp
2020-04-04 05:57:56
206.189.157.45 attackbotsspam
Apr  3 23:47:39 ourumov-web sshd\[12086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.157.45  user=root
Apr  3 23:47:42 ourumov-web sshd\[12086\]: Failed password for root from 206.189.157.45 port 26374 ssh2
Apr  3 23:56:46 ourumov-web sshd\[12771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.157.45  user=root
...
2020-04-04 05:57:42
148.70.121.210 attackbotsspam
Invalid user tjp from 148.70.121.210 port 37808
2020-04-04 05:39:09
77.82.90.234 attackbots
Apr  3 23:38:16 prox sshd[25338]: Failed password for root from 77.82.90.234 port 38420 ssh2
2020-04-04 06:01:15
52.130.80.212 attack
Invalid user weiyunong from 52.130.80.212 port 42316
2020-04-04 06:05:05
96.114.71.146 attack
Invalid user kayten from 96.114.71.146 port 46046
2020-04-04 06:10:13
222.186.180.142 attack
Apr  3 23:50:33 dcd-gentoo sshd[20858]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Apr  3 23:50:36 dcd-gentoo sshd[20858]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Apr  3 23:50:33 dcd-gentoo sshd[20858]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Apr  3 23:50:36 dcd-gentoo sshd[20858]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Apr  3 23:50:33 dcd-gentoo sshd[20858]: User root from 222.186.180.142 not allowed because none of user's groups are listed in AllowGroups
Apr  3 23:50:36 dcd-gentoo sshd[20858]: error: PAM: Authentication failure for illegal user root from 222.186.180.142
Apr  3 23:50:36 dcd-gentoo sshd[20858]: Failed keyboard-interactive/pam for invalid user root from 222.186.180.142 port 30397 ssh2
...
2020-04-04 05:56:37
77.93.33.212 attackbots
Apr  3 23:35:24 nextcloud sshd\[9899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.93.33.212  user=root
Apr  3 23:35:27 nextcloud sshd\[9899\]: Failed password for root from 77.93.33.212 port 33953 ssh2
Apr  3 23:41:57 nextcloud sshd\[17530\]: Invalid user chengm from 77.93.33.212
Apr  3 23:41:57 nextcloud sshd\[17530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.93.33.212
2020-04-04 05:50:13
222.59.9.17 attack
port scan and connect, tcp 23 (telnet)
2020-04-04 05:48:09
106.51.230.186 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-04 06:00:32
162.253.71.39 attackspambots
Brute force attack against VPN service
2020-04-04 05:53:14
106.13.209.16 attackspambots
Apr  3 23:39:18 srv01 sshd[11783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.16  user=root
Apr  3 23:39:20 srv01 sshd[11783]: Failed password for root from 106.13.209.16 port 59510 ssh2
Apr  3 23:41:58 srv01 sshd[11935]: Invalid user my from 106.13.209.16 port 41230
Apr  3 23:41:58 srv01 sshd[11935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.209.16
Apr  3 23:41:58 srv01 sshd[11935]: Invalid user my from 106.13.209.16 port 41230
Apr  3 23:42:00 srv01 sshd[11935]: Failed password for invalid user my from 106.13.209.16 port 41230 ssh2
...
2020-04-04 05:47:33

Recently Reported IPs

219.140.118.112 219.140.119.98 219.140.118.29 219.140.118.163
219.140.149.221 219.140.125.52 219.140.191.138 219.140.93.175
219.140.119.218 219.140.118.105 33.97.73.103 219.141.211.66
219.141.231.57 219.141.240.83 219.141.231.66 219.141.248.70
219.141.183.246 219.142.62.19 219.142.101.45 219.141.183.233