Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.162.0.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.162.0.40.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 13:33:22 CST 2022
;; MSG SIZE  rcvd: 105
Host info
40.0.162.158.in-addr.arpa domain name pointer www.lisboa.ucp.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.0.162.158.in-addr.arpa	name = www.lisboa.ucp.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.102.49.159 attackspam
Jul 30 18:48:54 debian-2gb-nbg1-2 kernel: \[18386224.184542\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.159 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=1944 PROTO=TCP SPT=55447 DPT=8216 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-31 00:52:02
183.129.146.18 attackbots
Jul 30 17:10:06 sigma sshd\[13403\]: Invalid user munni from 183.129.146.18Jul 30 17:10:08 sigma sshd\[13403\]: Failed password for invalid user munni from 183.129.146.18 port 5318 ssh2
...
2020-07-31 00:41:24
195.146.117.22 attack
Jul 30 13:48:55 mail.srvfarm.net postfix/smtps/smtpd[3873945]: warning: unknown[195.146.117.22]: SASL PLAIN authentication failed: 
Jul 30 13:48:55 mail.srvfarm.net postfix/smtps/smtpd[3873945]: lost connection after AUTH from unknown[195.146.117.22]
Jul 30 13:51:04 mail.srvfarm.net postfix/smtps/smtpd[3872722]: warning: unknown[195.146.117.22]: SASL PLAIN authentication failed: 
Jul 30 13:51:04 mail.srvfarm.net postfix/smtps/smtpd[3872722]: lost connection after AUTH from unknown[195.146.117.22]
Jul 30 13:55:51 mail.srvfarm.net postfix/smtps/smtpd[3873949]: warning: unknown[195.146.117.22]: SASL PLAIN authentication failed:
2020-07-31 01:07:33
112.85.42.89 attackbots
Jul 30 18:37:31 ns381471 sshd[10239]: Failed password for root from 112.85.42.89 port 55751 ssh2
2020-07-31 00:45:06
47.48.75.198 attack
Jul 30 12:13:12 django-0 sshd[8395]: Failed password for invalid user admin from 47.48.75.198 port 55121 ssh2
Jul 30 12:13:12 django-0 sshd[8398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-048-075-198.biz.spectrum.com  user=root
Jul 30 12:13:14 django-0 sshd[8398]: Failed password for root from 47.48.75.198 port 55206 ssh2
...
2020-07-31 00:43:09
171.232.249.153 spam
cẩn thận
2020-07-31 00:37:33
92.222.75.80 attackbotsspam
frenzy
2020-07-31 00:48:46
195.54.160.21 attackbots
 TCP (SYN) 195.54.160.21:41402 -> port 80, len 44
2020-07-31 00:53:47
138.197.151.213 attack
Jul 30 14:10:22 rocket sshd[10624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213
Jul 30 14:10:23 rocket sshd[10624]: Failed password for invalid user caolicheng from 138.197.151.213 port 38868 ssh2
...
2020-07-31 00:50:11
81.17.80.126 attack
Jul 30 20:05:54 itachi1706steam sshd[42103]: Did not receive identification string from 81.17.80.126 port 50318
Jul 30 20:05:59 itachi1706steam sshd[42114]: Invalid user user from 81.17.80.126 port 53302
Jul 30 20:05:59 itachi1706steam sshd[42114]: Connection closed by invalid user user 81.17.80.126 port 53302 [preauth]
...
2020-07-31 00:49:35
175.197.233.197 attackspambots
Jul 30 17:14:53 ns382633 sshd\[10937\]: Invalid user mhchang from 175.197.233.197 port 50192
Jul 30 17:14:53 ns382633 sshd\[10937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.233.197
Jul 30 17:14:56 ns382633 sshd\[10937\]: Failed password for invalid user mhchang from 175.197.233.197 port 50192 ssh2
Jul 30 17:27:35 ns382633 sshd\[13422\]: Invalid user hubl from 175.197.233.197 port 60934
Jul 30 17:27:35 ns382633 sshd\[13422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.197.233.197
2020-07-31 01:05:54
122.51.18.119 attackbotsspam
Jul 30 13:32:32 firewall sshd[16972]: Invalid user gaoguangyuan from 122.51.18.119
Jul 30 13:32:34 firewall sshd[16972]: Failed password for invalid user gaoguangyuan from 122.51.18.119 port 56536 ssh2
Jul 30 13:37:09 firewall sshd[17092]: Invalid user zhangyongqing from 122.51.18.119
...
2020-07-31 01:04:23
49.88.112.69 attack
Jul 30 18:30:57 vps sshd[380568]: Failed password for root from 49.88.112.69 port 48261 ssh2
Jul 30 18:31:00 vps sshd[380568]: Failed password for root from 49.88.112.69 port 48261 ssh2
Jul 30 18:31:02 vps sshd[380568]: Failed password for root from 49.88.112.69 port 48261 ssh2
Jul 30 18:32:22 vps sshd[385605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Jul 30 18:32:24 vps sshd[385605]: Failed password for root from 49.88.112.69 port 29630 ssh2
...
2020-07-31 00:46:24
120.92.11.9 attackbots
Jul 30 10:28:53 Host-KLAX-C sshd[1465]: Disconnected from invalid user genedimen 120.92.11.9 port 29673 [preauth]
...
2020-07-31 00:59:31
190.38.11.65 attack
1596110770 - 07/30/2020 14:06:10 Host: 190.38.11.65/190.38.11.65 Port: 445 TCP Blocked
2020-07-31 00:33:02

Recently Reported IPs

158.140.92.146 42.129.117.225 158.170.64.150 158.145.65.37
158.156.162.92 158.174.107.243 158.174.19.55 158.174.55.4
147.232.34.215 158.174.61.226 158.174.189.9 158.176.124.242
158.176.131.137 158.174.197.39 158.174.22.247 158.174.9.202
158.177.102.246 158.176.135.193 158.181.167.32 158.177.208.33