Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.141.162.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.141.162.40.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023110401 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 05 04:45:13 CST 2023
;; MSG SIZE  rcvd: 107
Host info
40.162.141.146.in-addr.arpa domain name pointer pc40.pkres.wits.ac.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.162.141.146.in-addr.arpa	name = pc40.pkres.wits.ac.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
105.98.15.161 attackspam
[08/Jul/2019:20:44:56 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1"
2019-07-09 05:22:45
187.171.242.195 attack
445/tcp
[2019-07-08]1pkt
2019-07-09 05:47:49
206.189.119.73 attackspambots
Jul  8 14:44:12 xm3 sshd[13911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73  user=r.r
Jul  8 14:44:14 xm3 sshd[13911]: Failed password for r.r from 206.189.119.73 port 49448 ssh2
Jul  8 14:44:14 xm3 sshd[13911]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth]
Jul  8 14:46:48 xm3 sshd[20461]: Failed password for invalid user dc from 206.189.119.73 port 48938 ssh2
Jul  8 14:46:48 xm3 sshd[20461]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth]
Jul  8 14:48:35 xm3 sshd[23304]: Failed password for invalid user lai from 206.189.119.73 port 38088 ssh2
Jul  8 14:48:35 xm3 sshd[23304]: Received disconnect from 206.189.119.73: 11: Bye Bye [preauth]
Jul  8 14:50:13 xm3 sshd[30717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.73  user=r.r
Jul  8 14:50:16 xm3 sshd[30717]: Failed password for r.r from 206.189.119.73 port 55472 ssh2
Jul  8 ........
-------------------------------
2019-07-09 06:06:48
104.40.240.212 attack
3389BruteforceFW22
2019-07-09 05:56:33
193.70.36.161 attackbots
Brute force SMTP login attempted.
...
2019-07-09 06:10:01
206.189.131.213 attack
Jul  8 23:29:27 ArkNodeAT sshd\[2587\]: Invalid user juan from 206.189.131.213
Jul  8 23:29:27 ArkNodeAT sshd\[2587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.131.213
Jul  8 23:29:29 ArkNodeAT sshd\[2587\]: Failed password for invalid user juan from 206.189.131.213 port 52396 ssh2
2019-07-09 05:48:31
62.5.185.121 attack
23/tcp
[2019-07-08]1pkt
2019-07-09 05:23:10
113.228.77.27 attackspambots
23/tcp 23/tcp
[2019-07-08]2pkt
2019-07-09 05:45:17
139.59.170.23 attackbots
Automatic report - Web App Attack
2019-07-09 05:42:24
36.66.149.211 attackspambots
ssh bruteforce or scan
...
2019-07-09 06:09:45
114.40.184.55 attackspambots
37215/tcp
[2019-07-08]1pkt
2019-07-09 05:46:43
79.8.245.19 attackbots
$f2bV_matches
2019-07-09 05:44:29
184.82.10.76 attackspam
frenzy
2019-07-09 05:30:36
66.249.64.135 attackspambots
Automatic report - Web App Attack
2019-07-09 05:40:47
113.121.168.252 attackbotsspam
Multiple failed FTP logins
2019-07-09 05:53:35

Recently Reported IPs

164.68.111.97 4.74.72.6 143.161.157.80 164.92.202.66
232.143.108.27 162.12.215.76 162.12.215.237 192.168.3.5
103.156.143.42 14.169.241.171 239.57.145.188 160.153.132.210
221.183.89.50 20.106.75.231 192.168.2.21 225.1.48.174
120.207.225.63 124.122.240.135 124.122.240.187 124.122.240.15