Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.64.40.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.64.40.136.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 126 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:26:49 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 136.40.64.119.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.40.64.119.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.34.131 attack
2020-10-11T17:52:37.6312981495-001 sshd[27285]: Failed password for invalid user asterisk from 106.13.34.131 port 48463 ssh2
2020-10-11T17:56:00.4540001495-001 sshd[27439]: Invalid user rivera from 106.13.34.131 port 48468
2020-10-11T17:56:00.4601891495-001 sshd[27439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.34.131
2020-10-11T17:56:00.4540001495-001 sshd[27439]: Invalid user rivera from 106.13.34.131 port 48468
2020-10-11T17:56:02.0510661495-001 sshd[27439]: Failed password for invalid user rivera from 106.13.34.131 port 48468 ssh2
2020-10-11T17:59:21.3332791495-001 sshd[27650]: Invalid user baerbel from 106.13.34.131 port 48481
...
2020-10-12 20:03:30
118.24.233.84 attack
(sshd) Failed SSH login from 118.24.233.84 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 03:51:26 server2 sshd[917]: Invalid user lemwal from 118.24.233.84
Oct 12 03:51:26 server2 sshd[917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.233.84 
Oct 12 03:51:28 server2 sshd[917]: Failed password for invalid user lemwal from 118.24.233.84 port 48486 ssh2
Oct 12 04:08:07 server2 sshd[10206]: Invalid user lestat from 118.24.233.84
Oct 12 04:08:07 server2 sshd[10206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.233.84
2020-10-12 20:08:19
46.21.68.142 attack
11.10.2020 22:43:48 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-10-12 19:41:09
185.81.157.139 attack
MAIL: User Login Brute Force Attempt
2020-10-12 19:46:05
217.182.140.117 attack
217.182.140.117 - - [12/Oct/2020:01:03:11 +1100] "POST /wp-login.php HTTP/1.0" 200 9402 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.140.117 - - [12/Oct/2020:06:30:17 +1100] "POST /wp-login.php HTTP/1.0" 200 12488 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.140.117 - - [12/Oct/2020:12:21:20 +1100] "POST /wp-login.php HTTP/1.1" 200 2511 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.140.117 - - [12/Oct/2020:12:21:23 +1100] "POST /wp-login.php HTTP/1.1" 200 2466 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.182.140.117 - - [12/Oct/2020:21:08:44 +1100] "POST /wp-login.php HTTP/1.1" 200 2511 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 20:04:41
210.16.188.171 attackbots
Invalid user oracle from 210.16.188.171 port 33766
2020-10-12 19:48:45
218.92.0.250 attackbots
2020-10-12T14:54:25.636570lavrinenko.info sshd[18769]: Failed password for root from 218.92.0.250 port 59653 ssh2
2020-10-12T14:54:29.311161lavrinenko.info sshd[18769]: Failed password for root from 218.92.0.250 port 59653 ssh2
2020-10-12T14:54:34.397794lavrinenko.info sshd[18769]: Failed password for root from 218.92.0.250 port 59653 ssh2
2020-10-12T14:54:39.344580lavrinenko.info sshd[18769]: Failed password for root from 218.92.0.250 port 59653 ssh2
2020-10-12T14:54:39.425349lavrinenko.info sshd[18769]: error: maximum authentication attempts exceeded for root from 218.92.0.250 port 59653 ssh2 [preauth]
...
2020-10-12 20:00:01
165.227.39.176 attack
xmlrpc attack
2020-10-12 19:43:24
137.117.225.186 attackspambots
SSH brutforce
2020-10-12 20:06:53
111.231.77.115 attackbots
ET SCAN NMAP -sS window 1024
2020-10-12 20:01:00
193.112.96.42 attackbotsspam
Oct 12 11:04:32 cdc sshd[2700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.96.42 
Oct 12 11:04:35 cdc sshd[2700]: Failed password for invalid user hans from 193.112.96.42 port 45934 ssh2
2020-10-12 19:50:12
183.14.30.152 attackbots
Invalid user astrid from 183.14.30.152 port 25557
2020-10-12 20:17:19
198.46.154.246 attack
Brute forcing RDP port 3389
2020-10-12 19:58:31
45.154.197.102 attackbots
Oct 12 13:55:28 santamaria sshd\[15681\]: Invalid user alka from 45.154.197.102
Oct 12 13:55:28 santamaria sshd\[15681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.154.197.102
Oct 12 13:55:30 santamaria sshd\[15681\]: Failed password for invalid user alka from 45.154.197.102 port 38366 ssh2
...
2020-10-12 19:57:25
36.133.121.14 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.121.14 
Failed password for invalid user connor from 36.133.121.14 port 33762 ssh2
Failed password for root from 36.133.121.14 port 38508 ssh2
2020-10-12 19:45:34

Recently Reported IPs

46.28.72.67 67.49.104.36 182.121.225.22 200.12.30.130
114.141.160.121 2.183.105.205 198.199.94.189 108.18.151.99
14.32.136.4 119.130.119.168 179.100.75.236 182.34.36.181
190.83.16.82 177.248.196.12 154.73.65.101 170.210.44.162
75.86.217.173 34.89.170.251 2.181.179.70 47.155.241.164