Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.140.172.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.140.172.49.			IN	A

;; AUTHORITY SECTION:
.			180	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052800 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 28 14:56:58 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 49.172.140.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.172.140.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.227.104 attackspam
May 07 01:39:20 askasleikir sshd[176496]: Failed password for root from 106.13.227.104 port 59864 ssh2
May 07 01:31:24 askasleikir sshd[176457]: Failed password for invalid user installer from 106.13.227.104 port 56620 ssh2
May 07 01:42:15 askasleikir sshd[176509]: Failed password for root from 106.13.227.104 port 39476 ssh2
2020-05-07 15:20:44
152.32.254.193 attack
May  7 08:03:05 electroncash sshd[10132]: Failed password for root from 152.32.254.193 port 54564 ssh2
May  7 08:07:08 electroncash sshd[11171]: Invalid user sca from 152.32.254.193 port 35568
May  7 08:07:08 electroncash sshd[11171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.254.193 
May  7 08:07:08 electroncash sshd[11171]: Invalid user sca from 152.32.254.193 port 35568
May  7 08:07:10 electroncash sshd[11171]: Failed password for invalid user sca from 152.32.254.193 port 35568 ssh2
...
2020-05-07 15:27:49
31.14.142.225 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-07 15:05:34
91.121.175.138 attackspambots
2020-05-07T05:59:27.903027shield sshd\[21187\]: Invalid user note from 91.121.175.138 port 56344
2020-05-07T05:59:27.906943shield sshd\[21187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns349249.ip-91-121-175.eu
2020-05-07T05:59:29.994401shield sshd\[21187\]: Failed password for invalid user note from 91.121.175.138 port 56344 ssh2
2020-05-07T06:03:43.383494shield sshd\[22257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns349249.ip-91-121-175.eu  user=root
2020-05-07T06:03:44.607847shield sshd\[22257\]: Failed password for root from 91.121.175.138 port 39444 ssh2
2020-05-07 15:09:48
96.30.77.148 attackbots
prod6
...
2020-05-07 15:19:23
193.112.107.55 attackbots
2020-05-07T04:09:01.212877abusebot-8.cloudsearch.cf sshd[9584]: Invalid user chantal from 193.112.107.55 port 38484
2020-05-07T04:09:01.221624abusebot-8.cloudsearch.cf sshd[9584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.107.55
2020-05-07T04:09:01.212877abusebot-8.cloudsearch.cf sshd[9584]: Invalid user chantal from 193.112.107.55 port 38484
2020-05-07T04:09:03.002073abusebot-8.cloudsearch.cf sshd[9584]: Failed password for invalid user chantal from 193.112.107.55 port 38484 ssh2
2020-05-07T04:18:29.193357abusebot-8.cloudsearch.cf sshd[10050]: Invalid user guest from 193.112.107.55 port 55388
2020-05-07T04:18:29.201398abusebot-8.cloudsearch.cf sshd[10050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.107.55
2020-05-07T04:18:29.193357abusebot-8.cloudsearch.cf sshd[10050]: Invalid user guest from 193.112.107.55 port 55388
2020-05-07T04:18:30.956835abusebot-8.cloudsearch.cf sshd[10050
...
2020-05-07 15:15:51
179.113.118.186 attackbotsspam
Unauthorized connection attempt detected from IP address 179.113.118.186 to port 23
2020-05-07 14:49:30
65.34.120.176 attackbots
fail2ban -- 65.34.120.176
...
2020-05-07 14:53:40
161.35.17.103 attackbots
May  6 23:52:24 ny01 sshd[13070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.17.103
May  6 23:52:25 ny01 sshd[13070]: Failed password for invalid user ama from 161.35.17.103 port 52992 ssh2
May  6 23:54:26 ny01 sshd[13309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.17.103
2020-05-07 15:08:44
138.197.89.212 attackbots
May  7 05:51:21 OPSO sshd\[28283\]: Invalid user maintenance from 138.197.89.212 port 60114
May  7 05:51:21 OPSO sshd\[28283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
May  7 05:51:23 OPSO sshd\[28283\]: Failed password for invalid user maintenance from 138.197.89.212 port 60114 ssh2
May  7 05:54:49 OPSO sshd\[29171\]: Invalid user tiny from 138.197.89.212 port 37380
May  7 05:54:49 OPSO sshd\[29171\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
2020-05-07 14:50:30
115.74.210.239 attackbots
SMB Server BruteForce Attack
2020-05-07 15:09:15
87.251.74.64 attackspambots
May  7 08:58:48 debian-2gb-nbg1-2 kernel: \[11093614.708005\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.64 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=24842 PROTO=TCP SPT=54584 DPT=11504 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-07 15:01:18
181.30.28.201 attackbots
(sshd) Failed SSH login from 181.30.28.201 (AR/Argentina/201-28-30-181.fibertel.com.ar): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  7 08:03:58 ubnt-55d23 sshd[14803]: Invalid user rodney from 181.30.28.201 port 46898
May  7 08:04:00 ubnt-55d23 sshd[14803]: Failed password for invalid user rodney from 181.30.28.201 port 46898 ssh2
2020-05-07 15:21:50
24.37.136.78 attackbotsspam
port scan and connect, tcp 443 (https)
2020-05-07 15:06:08
165.22.102.42 attackbotsspam
2020-05-06T23:57:49.171292linuxbox-skyline sshd[231156]: Invalid user fu from 165.22.102.42 port 46096
...
2020-05-07 14:55:03

Recently Reported IPs

180.92.226.47 136.244.91.129 64.68.3.225 153.152.223.184
80.18.39.93 185.39.46.4 75.63.47.52 35.128.42.191
7.9.3.192 141.41.39.145 48.71.1.2 44.58.252.235
248.114.219.117 164.61.59.75 23.69.187.85 174.91.1.244
211.201.251.32 187.66.88.227 224.29.179.211 68.234.240.176