Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.140.14.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.140.14.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 01:40:42 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 92.14.140.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 92.14.140.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.151.201 attack
Oct 24 19:57:50 plesk sshd[10674]: Invalid user teste from 106.12.151.201
Oct 24 19:57:50 plesk sshd[10674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201 
Oct 24 19:57:52 plesk sshd[10674]: Failed password for invalid user teste from 106.12.151.201 port 38652 ssh2
Oct 24 19:57:52 plesk sshd[10674]: Received disconnect from 106.12.151.201: 11: Bye Bye [preauth]
Oct 24 20:08:33 plesk sshd[11380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201  user=r.r
Oct 24 20:08:34 plesk sshd[11380]: Failed password for r.r from 106.12.151.201 port 56452 ssh2
Oct 24 20:08:35 plesk sshd[11380]: Received disconnect from 106.12.151.201: 11: Bye Bye [preauth]
Oct 24 20:12:30 plesk sshd[11716]: Invalid user lx from 106.12.151.201
Oct 24 20:12:30 plesk sshd[11716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.201 
Oct 24 20:12........
-------------------------------
2019-10-25 23:13:59
213.199.247.200 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-25 23:11:46
54.36.148.230 attackbotsspam
Automatic report - Banned IP Access
2019-10-25 23:18:12
111.231.200.37 attackbots
Oct 25 14:40:28 OPSO sshd\[19796\]: Invalid user bob from 111.231.200.37 port 20781
Oct 25 14:40:28 OPSO sshd\[19796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.200.37
Oct 25 14:40:30 OPSO sshd\[19796\]: Failed password for invalid user bob from 111.231.200.37 port 20781 ssh2
Oct 25 14:50:16 OPSO sshd\[21713\]: Invalid user es from 111.231.200.37 port 32095
Oct 25 14:50:16 OPSO sshd\[21713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.200.37
2019-10-25 22:53:21
45.170.174.195 attackspam
Automatic report - Port Scan Attack
2019-10-25 23:09:45
218.92.0.195 attackbots
Oct 25 15:55:04 dcd-gentoo sshd[2899]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups
Oct 25 15:55:08 dcd-gentoo sshd[2899]: error: PAM: Authentication failure for illegal user root from 218.92.0.195
Oct 25 15:55:04 dcd-gentoo sshd[2899]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups
Oct 25 15:55:08 dcd-gentoo sshd[2899]: error: PAM: Authentication failure for illegal user root from 218.92.0.195
Oct 25 15:55:04 dcd-gentoo sshd[2899]: User root from 218.92.0.195 not allowed because none of user's groups are listed in AllowGroups
Oct 25 15:55:08 dcd-gentoo sshd[2899]: error: PAM: Authentication failure for illegal user root from 218.92.0.195
Oct 25 15:55:08 dcd-gentoo sshd[2899]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.195 port 44699 ssh2
...
2019-10-25 23:14:54
51.77.116.47 attackspambots
Oct 25 17:34:09 sauna sshd[222076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.116.47
Oct 25 17:34:11 sauna sshd[222076]: Failed password for invalid user user1 from 51.77.116.47 port 49616 ssh2
...
2019-10-25 23:06:18
209.97.158.88 attackbots
Looking for resource vulnerabilities
2019-10-25 22:58:58
202.163.126.134 attackspambots
2019-10-25T12:02:35.032840shield sshd\[24502\]: Invalid user password from 202.163.126.134 port 35403
2019-10-25T12:02:35.040634shield sshd\[24502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
2019-10-25T12:02:36.939241shield sshd\[24502\]: Failed password for invalid user password from 202.163.126.134 port 35403 ssh2
2019-10-25T12:07:41.229986shield sshd\[25289\]: Invalid user Senha!234 from 202.163.126.134 port 54772
2019-10-25T12:07:41.236224shield sshd\[25289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.126.134
2019-10-25 22:54:01
197.248.205.53 attackspam
2019-10-25T13:10:07.195857abusebot-5.cloudsearch.cf sshd\[3333\]: Invalid user vonachen from 197.248.205.53 port 43200
2019-10-25 23:10:15
94.51.163.252 attack
Chat Spam
2019-10-25 22:47:55
78.128.113.119 attack
Oct 25 16:57:37 andromeda postfix/smtpd\[14350\]: warning: unknown\[78.128.113.119\]: SASL PLAIN authentication failed: authentication failure
Oct 25 16:57:38 andromeda postfix/smtpd\[14087\]: warning: unknown\[78.128.113.119\]: SASL PLAIN authentication failed: authentication failure
Oct 25 16:58:16 andromeda postfix/smtpd\[12050\]: warning: unknown\[78.128.113.119\]: SASL PLAIN authentication failed: authentication failure
Oct 25 16:58:17 andromeda postfix/smtpd\[14087\]: warning: unknown\[78.128.113.119\]: SASL PLAIN authentication failed: authentication failure
Oct 25 16:58:29 andromeda postfix/smtpd\[12050\]: warning: unknown\[78.128.113.119\]: SASL PLAIN authentication failed: authentication failure
2019-10-25 23:17:12
54.37.232.108 attackbotsspam
Oct 25 16:56:47 vps647732 sshd[26982]: Failed password for root from 54.37.232.108 port 47274 ssh2
Oct 25 17:00:52 vps647732 sshd[27053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.232.108
...
2019-10-25 23:16:59
23.129.64.200 attack
Oct 25 14:06:50 serwer sshd\[5122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.200  user=root
Oct 25 14:06:52 serwer sshd\[5122\]: Failed password for root from 23.129.64.200 port 17719 ssh2
Oct 25 14:06:55 serwer sshd\[5122\]: Failed password for root from 23.129.64.200 port 17719 ssh2
...
2019-10-25 23:21:09
45.80.64.127 attack
Oct 25 16:11:11 MK-Soft-VM5 sshd[20956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.127 
Oct 25 16:11:13 MK-Soft-VM5 sshd[20956]: Failed password for invalid user joseph from 45.80.64.127 port 48594 ssh2
...
2019-10-25 23:00:36

Recently Reported IPs

254.152.17.7 200.5.99.107 140.220.144.240 221.64.37.179
251.242.236.120 250.26.205.55 243.43.66.214 48.227.74.178
247.156.78.21 212.4.103.1 154.55.119.1 174.212.103.111
253.171.70.131 87.212.208.74 96.118.157.26 137.113.75.200
167.157.191.111 187.3.74.198 71.209.151.85 49.250.216.116