Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.56.167.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36617
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.56.167.40.			IN	A

;; AUTHORITY SECTION:
.			211	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023021500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 15 21:58:17 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 40.167.56.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.167.56.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.54.251.14 attackspambots
1599324266 - 09/05/2020 18:44:26 Host: 1.54.251.14/1.54.251.14 Port: 445 TCP Blocked
2020-09-07 02:37:14
185.153.196.126 attackspambots
[MK-Root1] Blocked by UFW
2020-09-07 02:29:34
186.251.169.14 attackspambots
Unauthorized connection attempt from IP address 186.251.169.14 on Port 445(SMB)
2020-09-07 02:40:39
51.210.107.84 attack
reported through recidive - multiple failed attempts(SSH)
2020-09-07 02:47:11
188.152.100.60 attack
2020-09-06 05:16:06 server sshd[91607]: Failed password for invalid user root from 188.152.100.60 port 48978 ssh2
2020-09-07 02:33:50
200.122.224.200 attackbotsspam
Unauthorized connection attempt from IP address 200.122.224.200 on Port 445(SMB)
2020-09-07 02:20:55
45.249.84.39 attackspambots
Port Scan: TCP/443
2020-09-07 02:30:03
192.35.169.20 attack
 TCP (SYN) 192.35.169.20:48142 -> port 993, len 44
2020-09-07 02:16:20
123.206.65.38 attackspam
SSH Invalid Login
2020-09-07 02:36:03
167.71.240.218 attack
Sep  6 14:29:37 santamaria sshd\[24635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.240.218  user=root
Sep  6 14:29:39 santamaria sshd\[24635\]: Failed password for root from 167.71.240.218 port 36184 ssh2
Sep  6 14:33:13 santamaria sshd\[24697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.240.218  user=root
...
2020-09-07 02:43:09
5.51.111.195 attack
reported through recidive - multiple failed attempts(SSH)
2020-09-07 02:13:17
14.236.40.45 attackspambots
Unauthorized connection attempt from IP address 14.236.40.45 on Port 445(SMB)
2020-09-07 02:14:04
43.241.64.199 attackspam
Icarus honeypot on github
2020-09-07 02:25:05
82.131.209.179 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-07 02:44:45
116.98.140.102 attack
81/tcp
[2020-09-06]1pkt
2020-09-07 02:32:08

Recently Reported IPs

118.194.20.81 45.22.170.149 41.71.97.47 111.72.49.92
236.89.21.142 224.75.89.153 248.120.103.201 104.65.194.110
56.134.255.80 30.191.96.199 147.89.170.88 36.89.70.153
105.212.207.12 150.140.21.200 188.160.11.115 195.161.114.189
190.16.254.111 177.51.224.48 66.30.212.96 122.150.100.210