Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.40.67.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.40.67.138.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:31:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
138.67.40.109.in-addr.arpa domain name pointer ip-109-40-67-138.web.vodafone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.67.40.109.in-addr.arpa	name = ip-109-40-67-138.web.vodafone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.92.88 attack
Sep 22 07:45:58 hiderm sshd\[30515\]: Invalid user andreas from 106.12.92.88
Sep 22 07:45:58 hiderm sshd\[30515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.88
Sep 22 07:46:00 hiderm sshd\[30515\]: Failed password for invalid user andreas from 106.12.92.88 port 52018 ssh2
Sep 22 07:51:12 hiderm sshd\[30987\]: Invalid user ubnt from 106.12.92.88
Sep 22 07:51:12 hiderm sshd\[30987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.92.88
2019-09-23 03:27:56
185.94.111.1 attack
Scanning random ports - tries to find possible vulnerable services
2019-09-23 03:49:43
148.70.23.131 attack
Sep 22 20:54:29 MK-Soft-VM6 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131 
Sep 22 20:54:32 MK-Soft-VM6 sshd[2149]: Failed password for invalid user tomcat from 148.70.23.131 port 41933 ssh2
...
2019-09-23 03:51:41
178.128.242.233 attackspam
Sep 22 11:28:01 ws19vmsma01 sshd[13160]: Failed password for root from 178.128.242.233 port 45284 ssh2
...
2019-09-23 03:34:39
190.104.236.147 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/190.104.236.147/ 
 AR - 1H : (41)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN11014 
 
 IP : 190.104.236.147 
 
 CIDR : 190.104.236.0/24 
 
 PREFIX COUNT : 180 
 
 UNIQUE IP COUNT : 49408 
 
 
 WYKRYTE ATAKI Z ASN11014 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-23 03:23:25
61.37.82.220 attack
k+ssh-bruteforce
2019-09-23 03:16:25
111.231.202.61 attack
k+ssh-bruteforce
2019-09-23 03:52:34
188.166.117.213 attackbots
2019-08-20 09:06:15,213 fail2ban.actions        [878]: NOTICE  [sshd] Ban 188.166.117.213
2019-08-20 12:14:23,686 fail2ban.actions        [878]: NOTICE  [sshd] Ban 188.166.117.213
2019-08-20 15:18:26,839 fail2ban.actions        [878]: NOTICE  [sshd] Ban 188.166.117.213
...
2019-09-23 03:49:12
180.168.76.222 attack
ssh intrusion attempt
2019-09-23 03:35:34
51.75.18.215 attackbotsspam
2019-09-22 02:27:50,355 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.75.18.215
2019-09-22 05:34:39,574 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.75.18.215
2019-09-22 08:39:57,987 fail2ban.actions        [800]: NOTICE  [sshd] Ban 51.75.18.215
...
2019-09-23 03:10:01
106.12.176.146 attack
Sep 22 07:15:24 lcprod sshd\[24530\]: Invalid user 1234 from 106.12.176.146
Sep 22 07:15:24 lcprod sshd\[24530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.146
Sep 22 07:15:26 lcprod sshd\[24530\]: Failed password for invalid user 1234 from 106.12.176.146 port 18919 ssh2
Sep 22 07:18:01 lcprod sshd\[24759\]: Invalid user sm from 106.12.176.146
Sep 22 07:18:01 lcprod sshd\[24759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.146
2019-09-23 03:15:19
54.145.6.162 attackbots
by Amazon Technologies Inc.
2019-09-23 03:12:21
62.234.65.92 attack
Sep 22 13:49:44 work-partkepr sshd\[29545\]: Invalid user aaa from 62.234.65.92 port 56678
Sep 22 13:49:44 work-partkepr sshd\[29545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.65.92
...
2019-09-23 03:53:01
49.88.112.85 attackspam
Sep 22 21:39:02 fr01 sshd[6280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.85  user=root
Sep 22 21:39:05 fr01 sshd[6280]: Failed password for root from 49.88.112.85 port 27679 ssh2
...
2019-09-23 03:42:18
167.114.153.77 attackbots
Sep 22 21:10:54 SilenceServices sshd[24957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.153.77
Sep 22 21:10:57 SilenceServices sshd[24957]: Failed password for invalid user test from 167.114.153.77 port 47031 ssh2
Sep 22 21:15:14 SilenceServices sshd[26148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.153.77
2019-09-23 03:43:34

Recently Reported IPs

109.38.76.144 109.40.242.204 109.41.192.44 109.40.66.81
109.38.195.35 109.40.0.210 109.41.64.99 109.36.48.48
109.41.195.46 109.41.131.68 109.48.111.84 109.42.113.249
109.42.0.55 109.42.2.123 109.41.65.74 109.48.245.14
109.43.115.233 109.48.249.33 109.48.41.206 109.48.80.253