Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lisbon

Region: Lisbon

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.71.40.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35527
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.71.40.105.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032900 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 29 13:24:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
105.40.71.109.in-addr.arpa domain name pointer cp43.webserver.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.40.71.109.in-addr.arpa	name = cp43.webserver.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.133.36.112 attackspambots
SSH Invalid Login
2020-06-27 06:11:04
51.38.236.221 attackspam
Jun 26 17:58:22 ny01 sshd[16522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.236.221
Jun 26 17:58:24 ny01 sshd[16522]: Failed password for invalid user camila from 51.38.236.221 port 54444 ssh2
Jun 26 18:04:09 ny01 sshd[17244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.236.221
2020-06-27 06:06:28
121.7.127.92 attack
Invalid user myroot from 121.7.127.92 port 59350
2020-06-27 06:10:12
94.191.88.34 attack
Invalid user odoo from 94.191.88.34 port 50082
2020-06-27 06:25:21
134.122.16.28 attackbotsspam
Port scan on 1 port(s): 23
2020-06-27 06:14:13
112.113.198.149 attack
Jun 25 06:20:36 CT728 sshd[1089]: reveeclipse mapping checking getaddrinfo for 149.198.113.112.broad.km.yn.dynamic.163data.com.cn [112.113.198.149] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 06:20:36 CT728 sshd[1090]: reveeclipse mapping checking getaddrinfo for 149.198.113.112.broad.km.yn.dynamic.163data.com.cn [112.113.198.149] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 06:20:39 CT728 sshd[1089]: Failed password for invalid user pi from 112.113.198.149 port 54102 ssh2
Jun 25 06:20:39 CT728 sshd[1090]: Failed password for invalid user pi from 112.113.198.149 port 54110 ssh2
Jun 25 06:20:39 CT728 sshd[1089]: Connection closed by 112.113.198.149 [preauth]
Jun 25 06:20:39 CT728 sshd[1090]: Connection closed by 112.113.198.149 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=112.113.198.149
2020-06-27 06:16:21
175.101.117.8 attack
719. On Jun 26 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 175.101.117.8.
2020-06-27 06:18:38
112.85.42.172 attack
Jun 27 00:16:16 mail sshd\[17363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jun 27 00:16:18 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:22 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:25 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:27 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:31 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
...
2020-06-27 06:23:42
51.75.18.215 attackbotsspam
Jun 26 23:59:11 mout sshd[23830]: Invalid user itadmin from 51.75.18.215 port 58202
2020-06-27 06:01:12
216.59.72.35 attackbots
Port 22 Scan, PTR: None
2020-06-27 06:37:50
216.45.43.233 attackspambots
Port 22 Scan, PTR: None
2020-06-27 06:32:20
222.186.180.17 attack
2020-06-27T00:18:53.680040n23.at sshd[1861562]: Failed password for root from 222.186.180.17 port 1504 ssh2
2020-06-27T00:18:58.494137n23.at sshd[1861562]: Failed password for root from 222.186.180.17 port 1504 ssh2
2020-06-27T00:19:02.170206n23.at sshd[1861562]: Failed password for root from 222.186.180.17 port 1504 ssh2
...
2020-06-27 06:19:33
51.195.146.202 attackbots
Unauthorized SSH connection attempt
2020-06-27 06:20:38
80.232.183.230 attackbots
Invalid user eddie from 80.232.183.230 port 55574
2020-06-27 05:59:16
47.42.214.14 attackbots
Port 22 Scan, PTR: None
2020-06-27 06:37:06

Recently Reported IPs

109.71.15.161 109.71.40.51 3.224.65.220 109.71.43.70
109.71.46.154 109.71.72.181 109.72.149.150 109.73.191.125
109.74.0.187 109.74.10.150 109.74.144.100 109.74.145.20
109.74.15.140 109.74.156.31 165.225.120.189 109.74.157.200
109.74.157.53 109.74.194.110 109.74.195.76 109.74.197.181