Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.217.157.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.217.157.40.			IN	A

;; AUTHORITY SECTION:
.			110	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010602 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 11:42:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 40.157.217.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 40.157.217.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.230.113.218 attackbots
Invalid user su from 157.230.113.218 port 45648
2020-04-22 00:51:30
219.144.137.1 attack
Invalid user user2 from 219.144.137.1 port 2685
2020-04-22 00:26:48
180.76.56.108 attackspambots
Apr 21 14:20:01 meumeu sshd[7504]: Failed password for root from 180.76.56.108 port 30646 ssh2
Apr 21 14:23:12 meumeu sshd[8099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.56.108 
Apr 21 14:23:15 meumeu sshd[8099]: Failed password for invalid user test from 180.76.56.108 port 52520 ssh2
...
2020-04-22 00:45:54
129.211.99.128 attack
Apr 21 17:45:00 pornomens sshd\[6086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.99.128  user=root
Apr 21 17:45:02 pornomens sshd\[6086\]: Failed password for root from 129.211.99.128 port 51958 ssh2
Apr 21 17:50:08 pornomens sshd\[6183\]: Invalid user s from 129.211.99.128 port 51758
Apr 21 17:50:08 pornomens sshd\[6183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.99.128
...
2020-04-22 01:01:36
122.51.130.21 attack
Apr 21 16:00:36 mail sshd[6264]: Invalid user test123 from 122.51.130.21
...
2020-04-22 01:04:53
91.220.81.213 spambotsattackproxynormal
steam account hacked. 
method : free skins link, if you enter login, password and code from your phone your accounts will be taken by them and automatically it will change password, email, phone number and delete steam guard.
IP is from russia
2020-04-22 00:46:45
138.68.4.8 attack
Invalid user r from 138.68.4.8 port 38076
2020-04-22 00:58:59
218.80.229.142 attackspambots
Invalid user postgres from 218.80.229.142 port 36617
2020-04-22 00:27:58
163.172.121.98 attackbots
2020-04-21T15:15:48.807201abusebot-3.cloudsearch.cf sshd[29096]: Invalid user vpn from 163.172.121.98 port 33692
2020-04-21T15:15:48.814089abusebot-3.cloudsearch.cf sshd[29096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.121.98
2020-04-21T15:15:48.807201abusebot-3.cloudsearch.cf sshd[29096]: Invalid user vpn from 163.172.121.98 port 33692
2020-04-21T15:15:51.080408abusebot-3.cloudsearch.cf sshd[29096]: Failed password for invalid user vpn from 163.172.121.98 port 33692 ssh2
2020-04-21T15:20:15.155008abusebot-3.cloudsearch.cf sshd[29328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.121.98  user=root
2020-04-21T15:20:16.407848abusebot-3.cloudsearch.cf sshd[29328]: Failed password for root from 163.172.121.98 port 47248 ssh2
2020-04-21T15:24:28.785588abusebot-3.cloudsearch.cf sshd[29597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.12
...
2020-04-22 00:50:14
122.155.1.148 attack
Invalid user test from 122.155.1.148 port 57342
2020-04-22 01:04:33
195.69.222.166 attackbotsspam
k+ssh-bruteforce
2020-04-22 00:37:32
212.83.183.57 attack
Invalid user af from 212.83.183.57 port 21749
2020-04-22 00:29:20
213.158.10.101 attack
SSH invalid-user multiple login attempts
2020-04-22 00:28:52
152.136.198.76 attack
prod8
...
2020-04-22 00:53:33
201.187.110.137 attackbotsspam
Apr 21 22:55:49 webhost01 sshd[12955]: Failed password for root from 201.187.110.137 port 18221 ssh2
...
2020-04-22 00:34:54

Recently Reported IPs

25.192.214.216 228.178.21.197 34.4.73.224 202.194.130.107
62.5.160.125 203.88.142.128 108.68.223.136 88.153.165.80
143.233.28.216 29.44.145.239 103.210.74.225 49.29.244.151
237.112.89.166 174.184.53.191 218.199.223.209 50.120.66.229
217.104.196.43 138.215.2.74 187.203.59.126 10.254.15.7