Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.40.42.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.40.42.180.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:40:00 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 180.42.40.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 180.42.40.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.221.254.230 attackspam
Oct 28 05:48:52 MK-Soft-VM6 sshd[30645]: Failed password for root from 213.221.254.230 port 50878 ssh2
...
2019-10-28 18:57:06
106.12.200.13 attackspambots
2019-10-28T07:23:51.755215abusebot-6.cloudsearch.cf sshd\[21684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.200.13  user=root
2019-10-28 18:41:10
82.11.109.234 attackbotsspam
2019-10-28T03:42:29.740258Z 9b16b3dbce8d New connection: 82.11.109.234:33030 (172.17.0.3:2222) [session: 9b16b3dbce8d]
2019-10-28T03:46:48.699740Z d06cccf74af7 New connection: 82.11.109.234:34326 (172.17.0.3:2222) [session: d06cccf74af7]
2019-10-28 18:40:13
138.68.82.220 attackspambots
Oct 28 06:00:10 www5 sshd\[25739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.82.220  user=root
Oct 28 06:00:12 www5 sshd\[25739\]: Failed password for root from 138.68.82.220 port 48118 ssh2
Oct 28 06:03:43 www5 sshd\[26764\]: Invalid user team-speak from 138.68.82.220
...
2019-10-28 18:37:57
159.89.131.61 attackbots
2019-10-27T23:33:08.898681ns525875 sshd\[3993\]: Invalid user ubnt from 159.89.131.61 port 41054
2019-10-27T23:33:08.903046ns525875 sshd\[3993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.131.61
2019-10-27T23:33:10.794877ns525875 sshd\[3993\]: Failed password for invalid user ubnt from 159.89.131.61 port 41054 ssh2
2019-10-27T23:33:11.438880ns525875 sshd\[4079\]: Invalid user admin from 159.89.131.61 port 44518
2019-10-27T23:33:11.442984ns525875 sshd\[4079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.131.61
2019-10-27T23:33:13.746342ns525875 sshd\[4079\]: Failed password for invalid user admin from 159.89.131.61 port 44518 ssh2
2019-10-27T23:33:14.397417ns525875 sshd\[4134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.131.61  user=root
2019-10-27T23:33:17.110578ns525875 sshd\[4134\]: Failed password for root from 159.89.1
...
2019-10-28 18:29:52
190.113.142.197 attackbotsspam
2019-10-28T08:40:40.263416abusebot-2.cloudsearch.cf sshd\[30850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.113.142.197  user=root
2019-10-28 18:49:10
61.76.175.195 attackbots
2019-10-21T14:11:12.343893ns525875 sshd\[9827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.175.195  user=root
2019-10-21T14:11:13.992154ns525875 sshd\[9827\]: Failed password for root from 61.76.175.195 port 41638 ssh2
2019-10-21T14:15:27.760788ns525875 sshd\[15172\]: Invalid user samhain from 61.76.175.195 port 55600
2019-10-21T14:15:27.767283ns525875 sshd\[15172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.175.195
2019-10-21T14:15:30.088388ns525875 sshd\[15172\]: Failed password for invalid user samhain from 61.76.175.195 port 55600 ssh2
2019-10-21T14:19:39.887064ns525875 sshd\[20232\]: Invalid user xguest from 61.76.175.195 port 41306
2019-10-21T14:19:39.893312ns525875 sshd\[20232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.175.195
2019-10-21T14:19:42.142591ns525875 sshd\[20232\]: Failed password for invalid user xguest
...
2019-10-28 18:41:42
83.18.39.233 attack
Automatic report - Port Scan Attack
2019-10-28 18:43:07
222.186.180.6 attackbots
Oct 28 11:16:01 minden010 sshd[31333]: Failed password for root from 222.186.180.6 port 16266 ssh2
Oct 28 11:16:05 minden010 sshd[31333]: Failed password for root from 222.186.180.6 port 16266 ssh2
Oct 28 11:16:09 minden010 sshd[31333]: Failed password for root from 222.186.180.6 port 16266 ssh2
Oct 28 11:16:13 minden010 sshd[31333]: Failed password for root from 222.186.180.6 port 16266 ssh2
...
2019-10-28 18:27:54
209.59.160.192 attack
2019-10-26T16:02:16.870953ns525875 sshd\[23289\]: Invalid user mpalin from 209.59.160.192 port 37472
2019-10-26T16:02:16.873104ns525875 sshd\[23289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.farlateal.com
2019-10-26T16:02:19.114581ns525875 sshd\[23289\]: Failed password for invalid user mpalin from 209.59.160.192 port 37472 ssh2
2019-10-26T16:06:43.628172ns525875 sshd\[28932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.farlateal.com  user=root
2019-10-26T16:06:46.192209ns525875 sshd\[28932\]: Failed password for root from 209.59.160.192 port 57927 ssh2
2019-10-26T16:10:10.987173ns525875 sshd\[813\]: Invalid user sammy from 209.59.160.192 port 47258
2019-10-26T16:10:10.993606ns525875 sshd\[813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=host.farlateal.com
2019-10-26T16:10:13.306946ns525875 sshd\[813\]: Failed password for invalid
...
2019-10-28 18:36:28
103.62.239.77 attackspambots
SSH Brute Force, server-1 sshd[26580]: Failed password for root from 103.62.239.77 port 38610 ssh2
2019-10-28 18:34:39
142.93.215.102 attackbotsspam
Oct 28 10:04:18 XXX sshd[19715]: Invalid user messagebus from 142.93.215.102 port 41156
2019-10-28 18:48:05
222.186.175.154 attackbots
Oct 28 06:39:04 ny01 sshd[19142]: Failed password for root from 222.186.175.154 port 8272 ssh2
Oct 28 06:39:20 ny01 sshd[19142]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 8272 ssh2 [preauth]
Oct 28 06:39:31 ny01 sshd[19176]: Failed password for root from 222.186.175.154 port 12386 ssh2
2019-10-28 18:45:09
112.64.34.165 attackspambots
2019-10-28T05:49:47.837032  sshd[23411]: Invalid user password from 112.64.34.165 port 39156
2019-10-28T05:49:47.851127  sshd[23411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.34.165
2019-10-28T05:49:47.837032  sshd[23411]: Invalid user password from 112.64.34.165 port 39156
2019-10-28T05:49:50.104496  sshd[23411]: Failed password for invalid user password from 112.64.34.165 port 39156 ssh2
2019-10-28T05:55:02.763240  sshd[23452]: Invalid user ultimate1 from 112.64.34.165 port 56975
...
2019-10-28 18:39:39
106.13.147.123 attackspambots
Oct 27 20:27:25 friendsofhawaii sshd\[920\]: Invalid user aleon from 106.13.147.123
Oct 27 20:27:25 friendsofhawaii sshd\[920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.123
Oct 27 20:27:27 friendsofhawaii sshd\[920\]: Failed password for invalid user aleon from 106.13.147.123 port 40462 ssh2
Oct 27 20:35:18 friendsofhawaii sshd\[1586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.123  user=root
Oct 27 20:35:20 friendsofhawaii sshd\[1586\]: Failed password for root from 106.13.147.123 port 49992 ssh2
2019-10-28 18:44:17

Recently Reported IPs

1.12.108.159 0.47.232.93 1.119.95.51 0.43.235.129
0.43.8.120 0.40.116.218 0.39.75.93 0.49.238.152
0.39.34.203 0.41.214.81 0.43.16.145 0.41.124.104
0.43.224.196 0.42.9.53 1.12.153.233 0.43.244.190
0.41.46.150 0.42.38.3 0.42.102.132 0.43.54.113