Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.0.19.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1465
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.0.19.140.			IN	A

;; AUTHORITY SECTION:
.			234	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 27 06:32:27 CST 2023
;; MSG SIZE  rcvd: 103
Host info
Host 140.19.0.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.19.0.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.14 attack
28935/tcp 23340/tcp 20552/tcp...
[2020-01-25/03-26]2548pkt,1285pt.(tcp)
2020-03-26 18:04:36
198.108.66.227 attackbotsspam
Port 9160 scan denied
2020-03-26 17:26:06
185.176.27.90 attack
03/26/2020-05:13:40.492619 185.176.27.90 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-26 18:01:49
51.91.212.80 attackspam
903/tcp 5900/tcp 9151/tcp...
[2020-01-25/03-26]1547pkt,115pt.(tcp)
2020-03-26 17:54:52
185.176.27.34 attack
03/26/2020-04:15:43.431532 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-26 17:32:20
195.49.186.210 attack
Port 5555 scan denied
2020-03-26 17:27:56
218.156.38.33 attackspam
Port 23 (Telnet) access denied
2020-03-26 17:18:18
164.68.112.178 attackspambots
Port 5672 scan denied
2020-03-26 17:37:53
185.176.27.42 attackspambots
Mar 26 08:50:03 debian-2gb-nbg1-2 kernel: \[7468079.303436\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=53842 PROTO=TCP SPT=49463 DPT=3340 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 17:31:51
51.79.60.147 attackspambots
Unauthorized connection attempt detected from IP address 51.79.60.147 to port 6914 [T]
2020-03-26 17:55:25
185.176.27.102 attack
148 packets to ports 7797 7889 7891 7983 7985 7998 7999 8000 8092 8093 8094 8186 8187 8188 8280 8281 8282 8295 8296 8297 8389 8390 8391 8483 8484 8485 8580 8581 8582
2020-03-26 17:31:25
185.94.111.1 attack
Mar 26 09:56:22 src: 185.94.111.1 signature match: "SCAN UPnP communication attempt" (sid: 100074) udp port: 1900
2020-03-26 18:05:49
83.209.20.188 attack
Mar 26 08:44:29 srv206 sshd[9581]: Invalid user abdullah from 83.209.20.188
...
2020-03-26 17:49:04
128.1.91.202 attackspam
8983/tcp 2083/tcp 999/tcp...
[2020-01-31/03-26]15pkt,9pt.(tcp)
2020-03-26 18:06:49
198.108.67.61 attackbotsspam
Mar 26 08:08:52 debian-2gb-nbg1-2 kernel: \[7465608.641901\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.67.61 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=32 ID=23519 PROTO=TCP SPT=15376 DPT=57785 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-26 17:23:45

Recently Reported IPs

192.81.22.128 181.17.161.10 161.19.137.40 43.148.20.228
214.237.56.69 20.78.160.70 98.9.185.130 37.9.63.58
163.0.48.203 59.167.149.25 201.156.207.105 168.222.166.50
179.2.51.105 233.125.84.47 178.63.60.94 71.62.77.36
238.169.60.102 100.4.121.245 192.103.248.173 130.44.26.94