Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.195.39.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.195.39.40.			IN	A

;; AUTHORITY SECTION:
.			591	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 04:15:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
40.39.195.109.in-addr.arpa domain name pointer 109x195x39x40.static-business.barnaul.ertelecom.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.39.195.109.in-addr.arpa	name = 109x195x39x40.static-business.barnaul.ertelecom.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.175.188.114 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2020-03-22 09:27:32
187.162.29.167 attackspambots
Automatic report - Port Scan Attack
2020-03-22 08:58:17
170.231.59.37 attack
Mar 20 19:43:22 server6 sshd[15269]: reveeclipse mapping checking getaddrinfo for static-gcnetprovedor.com.br [170.231.59.37] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 20 19:43:24 server6 sshd[15269]: Failed password for invalid user ptech from 170.231.59.37 port 44524 ssh2
Mar 20 19:43:24 server6 sshd[15269]: Received disconnect from 170.231.59.37: 11: Bye Bye [preauth]
Mar 20 19:48:26 server6 sshd[21056]: reveeclipse mapping checking getaddrinfo for static-gcnetprovedor.com.br [170.231.59.37] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 20 19:48:28 server6 sshd[21056]: Failed password for invalid user cisco from 170.231.59.37 port 26690 ssh2
Mar 20 19:48:28 server6 sshd[21056]: Received disconnect from 170.231.59.37: 11: Bye Bye [preauth]
Mar 20 19:53:14 server6 sshd[26152]: reveeclipse mapping checking getaddrinfo for static-gcnetprovedor.com.br [170.231.59.37] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 20 19:53:16 server6 sshd[26152]: Failed password for invalid user ms from ........
-------------------------------
2020-03-22 09:35:51
104.200.134.250 attack
Mar 21 20:57:40 NPSTNNYC01T sshd[9230]: Failed password for root from 104.200.134.250 port 55832 ssh2
Mar 21 20:58:23 NPSTNNYC01T sshd[9264]: Failed password for root from 104.200.134.250 port 51232 ssh2
...
2020-03-22 09:11:00
51.77.140.36 attackspam
SSH-BruteForce
2020-03-22 09:18:00
89.238.154.125 attackbotsspam
(From s.castanier@emeraudes.net.bmw.fr) Dating site for sех with girls from Spain: https://klurl.nl/?u=Nh9cjTzt
2020-03-22 09:29:09
181.49.118.185 attackspambots
Invalid user nx from 181.49.118.185 port 59928
2020-03-22 09:27:17
115.84.92.123 attackspambots
failed_logins
2020-03-22 09:33:01
167.99.66.158 attackbotsspam
Mar 21 23:48:29 l03 sshd[2311]: Invalid user team1 from 167.99.66.158 port 50696
...
2020-03-22 09:00:50
137.74.171.160 attack
Mar 22 01:16:06 ewelt sshd[29653]: Invalid user oracle from 137.74.171.160 port 59278
Mar 22 01:16:06 ewelt sshd[29653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.171.160
Mar 22 01:16:06 ewelt sshd[29653]: Invalid user oracle from 137.74.171.160 port 59278
Mar 22 01:16:07 ewelt sshd[29653]: Failed password for invalid user oracle from 137.74.171.160 port 59278 ssh2
...
2020-03-22 09:14:33
51.91.102.49 attack
Mar 22 05:55:40 gw1 sshd[6073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.102.49
Mar 22 05:55:42 gw1 sshd[6073]: Failed password for invalid user ilham from 51.91.102.49 port 36164 ssh2
...
2020-03-22 08:58:55
106.13.128.64 attackbots
Mar 22 00:37:08 DAAP sshd[30217]: Invalid user sunqiu from 106.13.128.64 port 37014
Mar 22 00:37:08 DAAP sshd[30217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.128.64
Mar 22 00:37:08 DAAP sshd[30217]: Invalid user sunqiu from 106.13.128.64 port 37014
Mar 22 00:37:09 DAAP sshd[30217]: Failed password for invalid user sunqiu from 106.13.128.64 port 37014 ssh2
Mar 22 00:40:52 DAAP sshd[30358]: Invalid user ts3user from 106.13.128.64 port 56836
...
2020-03-22 09:07:01
134.175.28.227 attack
Invalid user system from 134.175.28.227 port 59882
2020-03-22 09:03:26
35.227.35.222 attackbots
2020-03-22T01:06:13.473182struts4.enskede.local sshd\[24666\]: Invalid user ib from 35.227.35.222 port 33664
2020-03-22T01:06:13.480649struts4.enskede.local sshd\[24666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.35.227.35.bc.googleusercontent.com
2020-03-22T01:06:16.911194struts4.enskede.local sshd\[24666\]: Failed password for invalid user ib from 35.227.35.222 port 33664 ssh2
2020-03-22T01:09:09.004478struts4.enskede.local sshd\[24742\]: Invalid user emma from 35.227.35.222 port 58128
2020-03-22T01:09:09.010612struts4.enskede.local sshd\[24742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.35.227.35.bc.googleusercontent.com
...
2020-03-22 09:04:44
125.91.111.247 attack
Fail2Ban - SSH Bruteforce Attempt
2020-03-22 09:27:50

Recently Reported IPs

109.195.4.243 109.195.4.114 109.195.46.178 109.195.45.242
109.195.46.82 109.195.47.98 109.195.49.216 109.195.49.223
109.195.50.182 109.195.51.170 109.195.52.168 109.195.51.26
109.195.51.95 109.195.52.179 109.195.52.229 109.195.52.2
109.195.52.30 109.195.52.49 109.195.53.203 109.195.53.210