Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Badajoz

Region: Comunidad Autónoma de Extremadura

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.49.40.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11702
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.49.40.100.			IN	A

;; AUTHORITY SECTION:
.			19	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023051300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 13 16:01:24 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 100.40.49.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.40.49.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.59.56.20 attack
Automatic report - Web App Attack
2019-06-24 02:21:26
165.231.24.243 attack
NAME : FIBERGRID-20120611 CIDR : 165.231.0.0/16 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack Seychelles - block certain countries :) IP: 165.231.24.243  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 02:47:07
212.64.32.162 attackspambots
Unauthorized SSH login attempts
2019-06-24 02:51:05
185.101.156.127 attack
Unauthorised access (Jun 23) SRC=185.101.156.127 LEN=40 TTL=241 ID=280 TCP DPT=445 WINDOW=1024 SYN
2019-06-24 02:32:00
201.48.206.146 attack
Jun 23 10:42:27 xb3 sshd[28139]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:42:29 xb3 sshd[28139]: Failed password for invalid user hh from 201.48.206.146 port 36357 ssh2
Jun 23 10:42:29 xb3 sshd[28139]: Received disconnect from 201.48.206.146: 11: Bye Bye [preauth]
Jun 23 10:45:28 xb3 sshd[20279]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:45:31 xb3 sshd[20279]: Failed password for invalid user electrical from 201.48.206.146 port 48445 ssh2
Jun 23 10:45:31 xb3 sshd[20279]: Received disconnect from 201.48.206.146: 11: Bye Bye [preauth]
Jun 23 10:47:33 xb3 sshd[25943]: reveeclipse mapping checking getaddrinfo for 201-048-206-146.static.ctbctelecom.com.br [201.48.206.146] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 23 10:47:35 xb3 sshd[25943]: Failed password for in........
-------------------------------
2019-06-24 02:19:26
2.191.27.114 attackbotsspam
Port scan on 1 port(s): 9527
2019-06-24 02:25:33
124.134.32.236 attackspambots
8080/tcp
[2019-06-23]1pkt
2019-06-24 02:27:20
46.229.168.132 attack
NAME : ADVANCEDHOSTERS-NET CIDR : 46.229.168.0/23 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 46.229.168.132  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 02:49:09
185.253.250.168 attackbots
Jun 23 03:38:08 localhost kernel: [12519681.345443] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=185.253.250.168 DST=[mungedIP2] LEN=220 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=UDP SPT=50817 DPT=123 LEN=200 
Jun 23 10:38:20 localhost kernel: [12544893.554429] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.253.250.168 DST=[mungedIP2] LEN=220 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=UDP SPT=43025 DPT=123 LEN=200 
Jun 23 10:38:20 localhost kernel: [12544893.554455] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=185.253.250.168 DST=[mungedIP2] LEN=220 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=UDP SPT=43025 DPT=123 LEN=200
2019-06-24 02:35:52
218.8.163.167 attack
5500/tcp
[2019-06-23]1pkt
2019-06-24 02:59:56
27.194.92.133 attack
5500/tcp
[2019-06-23]1pkt
2019-06-24 02:33:45
184.105.139.123 attack
6379/tcp 445/tcp 548/tcp...
[2019-04-23/06-23]21pkt,7pt.(tcp),1pt.(udp)
2019-06-24 03:02:15
195.87.186.134 attackspambots
Brute force attempt
2019-06-24 03:01:02
43.231.116.107 attackbots
445/tcp
[2019-06-23]1pkt
2019-06-24 02:37:01
200.23.227.47 attackbots
SMTP-sasl brute force
...
2019-06-24 02:45:19

Recently Reported IPs

140.123.85.52 140.116.196.81 120.114.241.35 140.116.113.165
140.116.63.116 140.116.235.100 140.123.29.31 140.116.132.98
177.200.12.100 164.107.112.76 140.130.12.39 138.232.1.4
140.116.219.141 202.28.197.38 140.116.117.219 140.115.184.172
140.116.98.152 140.116.15.204 146.155.40.226 140.128.1.61