Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.40.14.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.40.14.42.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010300 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 03 20:34:25 CST 2022
;; MSG SIZE  rcvd: 105
Host info
42.14.40.136.in-addr.arpa domain name pointer 136-40-14-42.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.14.40.136.in-addr.arpa	name = 136-40-14-42.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.192.1.9 attack
DATE:2020-09-04 18:45:05, IP:187.192.1.9, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-06 03:05:07
167.114.251.164 attackspam
Invalid user ts2 from 167.114.251.164 port 58854
2020-09-06 02:32:31
165.227.125.173 attackspambots
165.227.125.173 - - [23/Jun/2020:08:39:15 +0000] "\x00\x0E8?\xB5" 400 166 "-" "-"
2020-09-06 02:44:01
219.109.231.159 attackbots
Unauthorized connection attempt from IP address 219.109.231.159 on Port 445(SMB)
2020-09-06 03:02:11
47.31.38.87 attack
1599237970 - 09/04/2020 18:46:10 Host: 47.31.38.87/47.31.38.87 Port: 445 TCP Blocked
2020-09-06 02:55:30
95.134.165.14 attack
Sep  4 18:46:06 mellenthin postfix/smtpd[32280]: NOQUEUE: reject: RCPT from 14-165-134-95.pool.ukrtel.net[95.134.165.14]: 554 5.7.1 Service unavailable; Client host [95.134.165.14] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/95.134.165.14; from= to= proto=ESMTP helo=<14-165-134-95.pool.ukrtel.net>
2020-09-06 03:04:19
179.243.246.171 attackspambots
Unauthorized connection attempt from IP address 179.243.246.171 on Port 445(SMB)
2020-09-06 02:59:03
95.9.144.40 attack
Auto Detect Rule!
proto TCP (SYN), 95.9.144.40:2235->gjan.info:23, len 44
2020-09-06 02:26:08
109.94.179.49 attackspam
Attempted connection to port 445.
2020-09-06 03:03:27
128.14.141.115 attackspam
 UDP 128.14.141.115:32807 -> port 500, len 68
2020-09-06 03:01:43
158.140.178.7 attackspambots
Unauthorized connection attempt from IP address 158.140.178.7 on Port 445(SMB)
2020-09-06 02:44:29
157.42.123.82 attack
157.42.123.82 - - [04/Sep/2020:18:46:03 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36"
157.42.123.82 - - [04/Sep/2020:18:46:07 +0200] "POST /wordpress/xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.93 Safari/537.36"
...
2020-09-06 03:00:58
37.49.230.169 attackspambots
SIPVicious Scanner Detection
2020-09-06 02:49:15
185.180.231.199 attack
"sipvicious"; tag=3533393765393339313363340132383335303033333236
2020-09-06 02:35:05
93.93.46.180 attackbotsspam
2020-09-05T18:00:44+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-06 02:31:44

Recently Reported IPs

228.161.161.23 166.248.66.110 183.116.176.63 61.247.203.3
86.184.221.18 94.163.99.163 221.181.190.205 237.213.247.3
136.123.84.52 8.108.128.155 51.184.239.152 148.226.91.213
38.234.229.207 174.198.43.6 225.196.233.105 55.22.205.124
50.244.203.124 124.138.12.28 232.3.33.139 46.68.47.162