Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: La Louvière

Region: Wallonia

Country: Belgium

Internet Service Provider: Proximus

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.134.142.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.134.142.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 11:17:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
40.142.134.109.in-addr.arpa domain name pointer 40.142-134-109.adsl-dyn.isp.belgacom.be.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.142.134.109.in-addr.arpa	name = 40.142-134-109.adsl-dyn.isp.belgacom.be.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.148 attack
Oct  2 21:58:57 herz-der-gamer sshd[25128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
Oct  2 21:58:59 herz-der-gamer sshd[25128]: Failed password for root from 222.186.175.148 port 6790 ssh2
...
2019-10-03 04:10:25
182.187.83.183 attackbotsspam
B: Magento admin pass /admin/ test (wrong country)
2019-10-03 04:14:07
193.239.44.121 attack
REQUESTED PAGE: /xmlrpc.php
2019-10-03 04:15:47
104.210.222.38 attack
SSH Brute-Force reported by Fail2Ban
2019-10-03 04:23:04
158.69.184.2 attack
$f2bV_matches
2019-10-03 03:57:59
92.118.37.88 attack
3389/tcp 10004/tcp 10037/tcp...
[2019-09-12/30]847pkt,334pt.(tcp)
2019-10-03 04:29:38
139.59.108.237 attackspam
Oct  2 08:29:47 TORMINT sshd\[14118\]: Invalid user edineide123 from 139.59.108.237
Oct  2 08:29:47 TORMINT sshd\[14118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.108.237
Oct  2 08:29:49 TORMINT sshd\[14118\]: Failed password for invalid user edineide123 from 139.59.108.237 port 56744 ssh2
...
2019-10-03 03:57:01
220.117.175.165 attack
Oct  2 03:50:28 eddieflores sshd\[3128\]: Invalid user sqsysop from 220.117.175.165
Oct  2 03:50:28 eddieflores sshd\[3128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.175.165
Oct  2 03:50:31 eddieflores sshd\[3128\]: Failed password for invalid user sqsysop from 220.117.175.165 port 44694 ssh2
Oct  2 03:56:05 eddieflores sshd\[3596\]: Invalid user national from 220.117.175.165
Oct  2 03:56:05 eddieflores sshd\[3596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.117.175.165
2019-10-03 04:01:05
36.103.228.38 attack
Oct  2 02:40:28 web9 sshd\[27136\]: Invalid user semik from 36.103.228.38
Oct  2 02:40:28 web9 sshd\[27136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.228.38
Oct  2 02:40:31 web9 sshd\[27136\]: Failed password for invalid user semik from 36.103.228.38 port 53651 ssh2
Oct  2 02:46:17 web9 sshd\[28017\]: Invalid user cheng from 36.103.228.38
Oct  2 02:46:17 web9 sshd\[28017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.103.228.38
2019-10-03 04:17:18
148.235.57.184 attack
Oct  2 21:30:30 core sshd[6462]: Failed password for root from 148.235.57.184 port 53228 ssh2
Oct  2 21:35:57 core sshd[12875]: Invalid user hf from 148.235.57.184 port 37204
...
2019-10-03 04:12:36
185.85.137.144 attack
B: Magento admin pass test (wrong country)
2019-10-03 04:15:14
49.234.46.125 attackspam
SSHAttack
2019-10-03 04:17:33
212.230.117.75 attackspambots
Automatic report - Port Scan Attack
2019-10-03 04:10:56
125.130.110.20 attack
Oct  2 20:47:00 MK-Soft-Root2 sshd[5775]: Failed password for root from 125.130.110.20 port 53232 ssh2
...
2019-10-03 04:22:41
81.248.60.236 attackbots
Automatic report - Port Scan Attack
2019-10-03 04:08:37

Recently Reported IPs

149.193.152.92 228.244.251.27 25.117.2.45 239.211.182.226
45.144.73.125 59.132.197.125 152.171.7.69 120.0.167.156
200.177.191.136 139.176.212.62 149.183.181.141 15.33.102.176
198.17.227.168 40.19.228.26 129.99.94.67 141.74.222.25
65.65.174.132 29.97.111.95 19.40.2.84 143.15.127.185