Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.93.109.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.93.109.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:35:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
40.109.93.159.in-addr.arpa domain name pointer nat109-40.jinr.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.109.93.159.in-addr.arpa	name = nat109-40.jinr.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.52.96.247 attackbots
2020-05-25T05:09:27.280766upcloud.m0sh1x2.com sshd[20516]: Invalid user judith from 106.52.96.247 port 45146
2020-05-25 14:25:47
112.17.184.171 attack
May 25 09:07:37 root sshd[19384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.17.184.171  user=root
May 25 09:07:39 root sshd[19384]: Failed password for root from 112.17.184.171 port 33474 ssh2
...
2020-05-25 14:28:23
51.38.71.36 attackspam
May 25 05:48:06 server sshd[37275]: Failed password for root from 51.38.71.36 port 41922 ssh2
May 25 05:50:46 server sshd[39452]: Failed password for root from 51.38.71.36 port 32892 ssh2
May 25 05:53:18 server sshd[41436]: Failed password for root from 51.38.71.36 port 52098 ssh2
2020-05-25 14:30:01
51.178.83.124 attackbots
2020-05-25T03:39:24.867741randservbullet-proofcloud-66.localdomain sshd[3702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-178-83.eu  user=root
2020-05-25T03:39:27.238753randservbullet-proofcloud-66.localdomain sshd[3702]: Failed password for root from 51.178.83.124 port 39056 ssh2
2020-05-25T03:53:33.102654randservbullet-proofcloud-66.localdomain sshd[3810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.ip-51-178-83.eu  user=root
2020-05-25T03:53:35.693909randservbullet-proofcloud-66.localdomain sshd[3810]: Failed password for root from 51.178.83.124 port 58592 ssh2
...
2020-05-25 14:14:21
67.211.216.7 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-25 14:41:17
195.206.105.217 attackspambots
May 25 07:45:58 ncomp sshd[5341]: User sshd from 195.206.105.217 not allowed because none of user's groups are listed in AllowGroups
May 25 07:45:58 ncomp sshd[5341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.206.105.217  user=sshd
May 25 07:45:58 ncomp sshd[5341]: User sshd from 195.206.105.217 not allowed because none of user's groups are listed in AllowGroups
May 25 07:46:00 ncomp sshd[5341]: Failed password for invalid user sshd from 195.206.105.217 port 51022 ssh2
2020-05-25 14:22:43
190.1.203.180 attackbots
May 25 05:48:30 roki-contabo sshd\[18438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.1.203.180  user=root
May 25 05:48:32 roki-contabo sshd\[18438\]: Failed password for root from 190.1.203.180 port 38870 ssh2
May 25 05:51:27 roki-contabo sshd\[18465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.1.203.180  user=root
May 25 05:51:29 roki-contabo sshd\[18465\]: Failed password for root from 190.1.203.180 port 37064 ssh2
May 25 05:53:14 roki-contabo sshd\[18498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.1.203.180  user=root
...
2020-05-25 14:34:01
103.21.77.231 attackspambots
May 25 05:44:58 rotator sshd\[26271\]: Invalid user tester from 103.21.77.231May 25 05:45:00 rotator sshd\[26271\]: Failed password for invalid user tester from 103.21.77.231 port 40876 ssh2May 25 05:49:24 rotator sshd\[27075\]: Invalid user named from 103.21.77.231May 25 05:49:27 rotator sshd\[27075\]: Failed password for invalid user named from 103.21.77.231 port 44482 ssh2May 25 05:53:35 rotator sshd\[27873\]: Invalid user oracle from 103.21.77.231May 25 05:53:37 rotator sshd\[27873\]: Failed password for invalid user oracle from 103.21.77.231 port 48092 ssh2
...
2020-05-25 14:13:47
118.242.19.74 attackspambots
SMB Server BruteForce Attack
2020-05-25 14:50:57
103.36.17.14 attack
1590378784 - 05/25/2020 05:53:04 Host: 103.36.17.14/103.36.17.14 Port: 445 TCP Blocked
2020-05-25 14:43:57
218.92.0.175 attackspambots
May 25 07:55:56 santamaria sshd\[3758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
May 25 07:55:58 santamaria sshd\[3758\]: Failed password for root from 218.92.0.175 port 33945 ssh2
May 25 07:56:01 santamaria sshd\[3758\]: Failed password for root from 218.92.0.175 port 33945 ssh2
...
2020-05-25 14:10:20
116.196.90.116 attack
$f2bV_matches
2020-05-25 14:46:35
111.231.66.135 attackspambots
May 24 22:11:14 dignus sshd[25212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
May 24 22:11:16 dignus sshd[25212]: Failed password for invalid user google from 111.231.66.135 port 51864 ssh2
May 24 22:15:22 dignus sshd[25577]: Invalid user oracle from 111.231.66.135 port 41006
May 24 22:15:22 dignus sshd[25577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
May 24 22:15:24 dignus sshd[25577]: Failed password for invalid user oracle from 111.231.66.135 port 41006 ssh2
...
2020-05-25 14:09:41
122.165.194.191 attackbotsspam
SSH Brute Force
2020-05-25 14:41:43
112.194.93.248 attack
May 24 06:40:11 warning: unknown[112.194.93.248]: SASL LOGIN authentication failed: authentication failure
May 24 06:40:13 warning: unknown[112.194.93.248]: SASL LOGIN authentication failed: authentication failure
May 24 06:40:14 warning: unknown[112.194.93.248]: SASL LOGIN authentication failed: authentication failure
2020-05-25 14:47:09

Recently Reported IPs

168.12.31.40 39.228.216.211 233.37.153.102 95.185.51.174
250.73.17.191 19.167.19.160 16.32.147.73 28.250.42.183
7.199.17.32 27.149.41.9 233.111.94.166 106.194.132.118
188.34.167.244 164.201.135.231 84.90.140.170 72.254.244.130
84.116.96.244 45.28.45.29 186.101.230.33 253.75.147.79