Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.40.106.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.40.106.129.			IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031101 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 03:31:51 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 129.106.40.117.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 117.40.106.129.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
36.225.136.193 attackbots
20/2/2@01:10:39: FAIL: Alarm-Network address from=36.225.136.193
20/2/2@01:10:39: FAIL: Alarm-Network address from=36.225.136.193
...
2020-02-02 21:14:00
45.55.128.109 attack
Unauthorized connection attempt detected from IP address 45.55.128.109 to port 2220 [J]
2020-02-02 21:26:12
120.150.199.138 attackspam
20/2/2@00:37:11: FAIL: Alarm-Network address from=120.150.199.138
...
2020-02-02 21:17:50
202.62.224.61 attack
Unauthorized connection attempt detected from IP address 202.62.224.61 to port 2220 [J]
2020-02-02 21:24:28
188.4.84.41 attack
Telnet/23 MH Probe, BF, Hack -
2020-02-02 21:17:25
45.76.244.28 attackspambots
Unauthorized connection attempt detected from IP address 45.76.244.28 to port 2220 [J]
2020-02-02 20:59:43
192.145.127.42 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-02 21:32:04
185.108.164.41 attack
Feb  2 05:48:09 debian-2gb-nbg1-2 kernel: \[2878144.623477\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.108.164.41 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=235 ID=30267 DF PROTO=TCP SPT=11663 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0
2020-02-02 21:27:37
200.233.240.48 attack
Unauthorized connection attempt detected from IP address 200.233.240.48 to port 2220 [J]
2020-02-02 21:01:24
180.157.252.206 attack
Unauthorized connection attempt detected from IP address 180.157.252.206 to port 2220 [J]
2020-02-02 21:21:21
132.248.88.76 attackbots
Unauthorized connection attempt detected from IP address 132.248.88.76 to port 2220 [J]
2020-02-02 21:23:34
39.108.152.95 attackbotsspam
39.108.152.95 - - [02/Feb/2020:11:47:33 +0300] "POST /wp-login.php HTTP/1.1" 200 2568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-02-02 21:02:19
185.156.73.52 attackbots
02/02/2020-08:25:20.971251 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-02 21:31:29
106.13.26.62 attack
Unauthorized connection attempt detected from IP address 106.13.26.62 to port 2220 [J]
2020-02-02 21:19:43
13.67.91.234 attackspambots
Unauthorized connection attempt detected from IP address 13.67.91.234 to port 2220 [J]
2020-02-02 21:03:24

Recently Reported IPs

117.40.106.123 117.40.106.133 117.40.106.139 117.40.106.14
117.40.106.142 117.40.106.146 117.40.106.152 117.40.106.156
63.12.1.159 117.40.106.160 117.40.106.162 117.40.106.169
117.40.106.178 117.40.106.185 117.40.106.191 127.83.41.161
117.40.106.202 117.42.33.101 117.42.33.105 117.42.33.119