Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: Shaw Communications Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 24.109.140.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42022
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;24.109.140.6.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 25 21:35:08 CST 2019
;; MSG SIZE  rcvd: 116

Host info
6.140.109.24.in-addr.arpa domain name pointer S010600222d99a950.tb.shawcable.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
6.140.109.24.in-addr.arpa	name = S010600222d99a950.tb.shawcable.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
167.71.55.1 attackspambots
Sep 27 00:15:02 game-panel sshd[11852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.55.1
Sep 27 00:15:03 game-panel sshd[11852]: Failed password for invalid user qqq from 167.71.55.1 port 33188 ssh2
Sep 27 00:19:37 game-panel sshd[12015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.55.1
2019-09-27 08:26:13
181.90.121.252 attack
Sep 27 01:30:10 bouncer sshd\[16875\]: Invalid user donna from 181.90.121.252 port 41216
Sep 27 01:30:10 bouncer sshd\[16875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.90.121.252 
Sep 27 01:30:11 bouncer sshd\[16875\]: Failed password for invalid user donna from 181.90.121.252 port 41216 ssh2
...
2019-09-27 08:23:12
191.249.117.140 attackspambots
Sep 27 02:08:31 s64-1 sshd[23070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.249.117.140
Sep 27 02:08:33 s64-1 sshd[23070]: Failed password for invalid user bu from 191.249.117.140 port 40579 ssh2
Sep 27 02:14:25 s64-1 sshd[23157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.249.117.140
...
2019-09-27 08:31:28
167.71.184.168 attackbots
2019-09-27T00:51:00.526489abusebot-7.cloudsearch.cf sshd\[23216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.184.168  user=root
2019-09-27 08:51:23
117.240.138.2 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/117.240.138.2/ 
 US - 1H : (607)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN9829 
 
 IP : 117.240.138.2 
 
 CIDR : 117.240.138.0/24 
 
 PREFIX COUNT : 2668 
 
 UNIQUE IP COUNT : 6122240 
 
 
 WYKRYTE ATAKI Z ASN9829 :  
  1H - 1 
  3H - 5 
  6H - 11 
 12H - 17 
 24H - 33 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-27 08:25:06
59.148.173.231 attack
Sep 26 14:57:48 hiderm sshd\[17884\]: Invalid user testtest from 59.148.173.231
Sep 26 14:57:48 hiderm sshd\[17884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=059148173231.ctinets.com
Sep 26 14:57:50 hiderm sshd\[17884\]: Failed password for invalid user testtest from 59.148.173.231 port 52406 ssh2
Sep 26 15:02:09 hiderm sshd\[18241\]: Invalid user ie from 59.148.173.231
Sep 26 15:02:09 hiderm sshd\[18241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=059148173231.ctinets.com
2019-09-27 09:02:35
54.37.139.235 attackspam
Sep 27 02:56:29 SilenceServices sshd[8361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.235
Sep 27 02:56:31 SilenceServices sshd[8361]: Failed password for invalid user user from 54.37.139.235 port 52798 ssh2
Sep 27 03:00:26 SilenceServices sshd[10872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.139.235
2019-09-27 09:00:47
222.186.173.183 attack
Sep 26 20:25:16 plusreed sshd[1140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Sep 26 20:25:19 plusreed sshd[1140]: Failed password for root from 222.186.173.183 port 8700 ssh2
...
2019-09-27 08:41:31
115.159.147.239 attackspambots
Sep 27 02:30:43 dedicated sshd[12946]: Invalid user ventrilo from 115.159.147.239 port 61057
2019-09-27 08:58:07
45.82.153.37 attackspambots
2019-09-27 02:58:04 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=hostmaster@nopcommerce.it\)
2019-09-27 02:58:12 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=hostmaster\)
2019-09-27 02:58:28 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 02:58:44 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 02:58:54 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data
2019-09-27 09:03:09
50.207.118.50 attackbotsspam
(From keeton.olen@yahoo.com) Hello there
 
I will Find Leads that Buy From You
I will Promote Your Business In Any Country To Any Niche.
==>   https://is.gd/CsXcPJ
 
Regards
2019-09-27 08:33:36
52.13.97.94 attackspam
Sep 25 15:53:06 xb3 sshd[19710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-13-97-94.us-west-2.compute.amazonaws.com
Sep 25 15:53:08 xb3 sshd[19710]: Failed password for invalid user info from 52.13.97.94 port 45174 ssh2
Sep 25 15:53:08 xb3 sshd[19710]: Received disconnect from 52.13.97.94: 11: Bye Bye [preauth]
Sep 25 15:57:00 xb3 sshd[18308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-13-97-94.us-west-2.compute.amazonaws.com
Sep 25 15:57:02 xb3 sshd[18308]: Failed password for invalid user temp from 52.13.97.94 port 60022 ssh2
Sep 25 15:57:02 xb3 sshd[18308]: Received disconnect from 52.13.97.94: 11: Bye Bye [preauth]
Sep 25 16:00:52 xb3 sshd[17151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-13-97-94.us-west-2.compute.amazonaws.com
Sep 25 16:00:55 xb3 sshd[17151]: Failed password for invalid user student from 52.1........
-------------------------------
2019-09-27 08:52:13
153.36.242.143 attackbotsspam
Sep 27 02:24:29 MK-Soft-Root2 sshd[1359]: Failed password for root from 153.36.242.143 port 26335 ssh2
Sep 27 02:24:32 MK-Soft-Root2 sshd[1359]: Failed password for root from 153.36.242.143 port 26335 ssh2
...
2019-09-27 08:26:37
14.177.70.68 attackbotsspam
Chat Spam
2019-09-27 08:43:13
105.225.34.16 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/105.225.34.16/ 
 US - 1H : (606)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN37457 
 
 IP : 105.225.34.16 
 
 CIDR : 105.225.0.0/16 
 
 PREFIX COUNT : 64 
 
 UNIQUE IP COUNT : 806400 
 
 
 WYKRYTE ATAKI Z ASN37457 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 5 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-27 08:36:32

Recently Reported IPs

71.8.115.181 126.212.173.39 55.3.88.31 196.83.167.113
131.115.183.15 252.184.222.37 102.209.148.137 107.8.14.185
150.42.51.228 32.189.153.63 148.59.200.35 209.58.232.162
79.23.188.67 72.10.189.129 197.51.156.251 13.30.192.12
82.28.134.165 203.170.243.238 94.27.151.193 27.48.138.8