Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.140.132.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.140.132.1.			IN	A

;; AUTHORITY SECTION:
.			385	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:55:16 CST 2022
;; MSG SIZE  rcvd: 106
Host info
1.132.140.222.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.132.140.222.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.160.247.28 attackbotsspam
Unauthorized connection attempt from IP address 125.160.247.28 on Port 445(SMB)
2019-11-11 07:18:27
77.26.188.72 attackbotsspam
Fail2Ban Ban Triggered
2019-11-11 07:14:04
124.193.196.104 attackbotsspam
Port Scan 1433
2019-11-11 07:19:00
103.92.24.36 attack
Automatic report - XMLRPC Attack
2019-11-11 07:25:21
35.168.170.206 attackspam
WordPress brute force
2019-11-11 07:12:03
218.92.0.203 attackbotsspam
2019-11-10T23:20:01.743159abusebot-8.cloudsearch.cf sshd\[21837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2019-11-11 07:28:44
60.221.255.176 attackbots
no
2019-11-11 07:21:03
129.226.76.114 attackbotsspam
Nov 11 00:09:43 MK-Soft-Root1 sshd[30979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.76.114 
Nov 11 00:09:45 MK-Soft-Root1 sshd[30979]: Failed password for invalid user Cleaner123 from 129.226.76.114 port 33374 ssh2
...
2019-11-11 07:11:13
14.173.192.205 attack
Unauthorized connection attempt from IP address 14.173.192.205 on Port 445(SMB)
2019-11-11 07:22:18
120.192.201.22 attack
Brute force attempt
2019-11-11 07:34:10
36.71.233.37 attackbots
Unauthorized connection attempt from IP address 36.71.233.37 on Port 445(SMB)
2019-11-11 07:08:29
222.112.65.55 attackspambots
2019-11-10T23:04:13.434489abusebot-7.cloudsearch.cf sshd\[14574\]: Invalid user postgr3s from 222.112.65.55 port 57139
2019-11-11 07:07:39
150.109.6.70 attackspambots
2019-11-10 22:02:34,942 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 150.109.6.70
2019-11-10 22:33:59,475 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 150.109.6.70
2019-11-10 23:05:41,923 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 150.109.6.70
2019-11-10 23:37:29,602 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 150.109.6.70
2019-11-11 00:10:15,423 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 150.109.6.70
...
2019-11-11 07:20:09
196.216.206.2 attack
Nov 10 13:20:15 auw2 sshd\[17049\]: Invalid user ozstore from 196.216.206.2
Nov 10 13:20:15 auw2 sshd\[17049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.216.206.2
Nov 10 13:20:17 auw2 sshd\[17049\]: Failed password for invalid user ozstore from 196.216.206.2 port 38532 ssh2
Nov 10 13:24:29 auw2 sshd\[17415\]: Invalid user oldham from 196.216.206.2
Nov 10 13:24:29 auw2 sshd\[17415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.216.206.2
2019-11-11 07:38:40
159.203.197.0 attack
firewall-block, port(s): 81/tcp
2019-11-11 07:43:15

Recently Reported IPs

222.139.76.111 222.140.143.202 222.140.156.138 222.140.157.37
222.140.156.63 222.140.177.214 222.140.137.30 222.140.161.170
222.140.190.161 222.140.170.103 222.140.141.64 222.140.171.136
222.140.217.6 222.140.191.7 222.140.251.199 222.140.209.82
222.140.194.195 222.140.186.202 222.140.187.15 222.140.67.44