Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
219.140.119.44 attackspambots
219.140.119.44 - - \[31/Jan/2020:10:43:47 +0200\] "GET http://www.rfa.org/english/ HTTP/1.1" 404 206 "-" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/45.0.2454.101 Safari/537.36"
2020-01-31 22:39:59
219.140.119.231 attackbots
Unauthorized connection attempt detected from IP address 219.140.119.231 to port 8082 [J]
2020-01-29 07:49:39
219.140.119.139 attack
Unauthorized connection attempt detected from IP address 219.140.119.139 to port 80 [J]
2020-01-14 15:03:45
219.140.119.159 attackspambots
Unauthorized connection attempt detected from IP address 219.140.119.159 to port 2053
2019-12-31 06:17:35
219.140.119.132 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54315a9eca57e82d | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.096783921 Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-12 05:31:12
219.140.119.250 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54160cf68976996b | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/4.047745454 Mozilla/4.0 (compatible; MSIE 5.00; Windows 98) | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:06:05
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.140.119.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.140.119.234.		IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:11:52 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 234.119.140.219.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.119.140.219.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.231.5.253 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 08:32:44
1.234.83.119 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 08:26:00
185.151.242.184 attackbotsspam
Port 3333 scan denied
2020-02-15 09:03:54
106.13.30.80 attack
Invalid user tsf from 106.13.30.80 port 57910
2020-02-15 08:43:40
223.19.6.189 attackspam
Honeypot attack, port: 5555, PTR: 189-6-19-223-on-nets.com.
2020-02-15 08:44:54
196.52.43.108 attackspambots
firewall-block, port(s): 7547/tcp
2020-02-15 08:31:32
104.162.79.204 attackspambots
Honeypot attack, port: 81, PTR: cpe-104-162-79-204.nyc.res.rr.com.
2020-02-15 08:29:05
115.110.71.186 attack
Honeypot attack, port: 445, PTR: 115.110.71.186.static-bangalore.vsnl.net.in.
2020-02-15 08:34:46
185.150.190.103 attack
Feb 15 01:37:42 debian-2gb-nbg1-2 kernel: \[3986286.084412\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.150.190.103 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=57499 DPT=60001 WINDOW=65535 RES=0x00 SYN URGP=0
2020-02-15 08:42:55
106.12.212.142 attackbots
$f2bV_matches
2020-02-15 08:28:54
202.152.15.12 attackspam
Feb 14 19:25:20 plusreed sshd[4282]: Invalid user zole from 202.152.15.12
...
2020-02-15 08:32:30
92.63.194.3 attack
RDP brute forcing (r)
2020-02-15 08:34:28
128.199.220.232 attack
Feb 14 19:23:46 vps46666688 sshd[22212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.220.232
Feb 14 19:23:48 vps46666688 sshd[22212]: Failed password for invalid user brattberg from 128.199.220.232 port 42176 ssh2
...
2020-02-15 08:43:16
37.165.170.70 attackspam
Brute force attempt
2020-02-15 08:22:07
37.187.181.182 attackbots
Feb 15 01:38:01 dedicated sshd[2390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.181.182  user=root
Feb 15 01:38:03 dedicated sshd[2390]: Failed password for root from 37.187.181.182 port 60054 ssh2
2020-02-15 08:41:40

Recently Reported IPs

116.132.76.143 37.228.236.155 46.151.151.33 118.47.82.50
104.35.46.79 37.156.144.206 182.59.53.200 123.96.210.100
124.114.206.235 78.140.8.245 49.112.95.51 61.39.38.138
104.152.59.78 37.112.104.37 113.88.167.239 171.7.223.104
59.181.132.247 14.231.180.151 162.216.143.132 200.24.157.118