Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.104.9.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63297
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.104.9.40.			IN	A

;; AUTHORITY SECTION:
.			446	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 87 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:09:13 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 40.9.104.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.9.104.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.212.194.6 attackbotsspam
Feb 13 07:01:19 silence02 sshd[23609]: Failed password for root from 210.212.194.6 port 43738 ssh2
Feb 13 07:03:26 silence02 sshd[23790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.6
Feb 13 07:03:28 silence02 sshd[23790]: Failed password for invalid user ruksenas from 210.212.194.6 port 59814 ssh2
2020-02-13 20:42:32
43.243.72.138 attackbotsspam
Invalid user vince from 43.243.72.138 port 57966
2020-02-13 21:29:39
94.25.239.162 attackbotsspam
Unauthorized connection attempt from IP address 94.25.239.162 on Port 445(SMB)
2020-02-13 20:44:38
101.91.160.243 attackbots
Invalid user rid from 101.91.160.243 port 49718
2020-02-13 21:11:44
1.197.88.55 attack
Unauthorized connection attempt from IP address 1.197.88.55 on Port 445(SMB)
2020-02-13 20:59:22
203.177.95.252 attack
(ftpd) Failed FTP login from 203.177.95.252 (PH/Philippines/mail.insurance.gov.ph): 10 in the last 3600 secs
2020-02-13 21:23:13
145.255.9.142 attackbotsspam
Feb 13 13:05:54 pornomens sshd\[17256\]: Invalid user qawzse from 145.255.9.142 port 43696
Feb 13 13:05:54 pornomens sshd\[17256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.255.9.142
Feb 13 13:05:57 pornomens sshd\[17256\]: Failed password for invalid user qawzse from 145.255.9.142 port 43696 ssh2
...
2020-02-13 21:05:20
51.15.43.15 attackbotsspam
Feb 13 13:15:14 dedicated sshd[22639]: Invalid user ftpuser from 51.15.43.15 port 38670
2020-02-13 21:22:48
14.177.64.173 attackspambots
Unauthorized connection attempt from IP address 14.177.64.173 on Port 445(SMB)
2020-02-13 21:26:40
159.65.41.104 attackspambots
Invalid user elastic from 159.65.41.104 port 46418
2020-02-13 21:14:18
124.122.21.129 attack
$f2bV_matches
2020-02-13 21:06:56
187.109.10.100 attackspambots
Feb 13 05:43:29 icinga sshd[51772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100 
Feb 13 05:43:32 icinga sshd[51772]: Failed password for invalid user jill from 187.109.10.100 port 36296 ssh2
Feb 13 05:45:40 icinga sshd[53631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.109.10.100 
...
2020-02-13 21:07:31
49.49.240.162 attackbots
Unauthorized connection attempt from IP address 49.49.240.162 on Port 445(SMB)
2020-02-13 21:02:16
49.88.112.67 attack
Feb 13 13:50:57 v22018053744266470 sshd[25202]: Failed password for root from 49.88.112.67 port 26600 ssh2
Feb 13 13:52:05 v22018053744266470 sshd[25278]: Failed password for root from 49.88.112.67 port 17546 ssh2
Feb 13 13:52:07 v22018053744266470 sshd[25278]: Failed password for root from 49.88.112.67 port 17546 ssh2
...
2020-02-13 21:05:49
93.94.145.24 attackbotsspam
unauthorized connection attempt
2020-02-13 21:25:37

Recently Reported IPs

194.104.9.206 194.105.131.42 194.105.130.29 194.104.9.68
194.104.9.205 194.105.131.43 194.105.150.194 194.106.119.102
194.104.99.200 194.105.130.28 194.106.111.42 194.106.180.18
194.105.56.170 194.106.192.2 194.106.180.42 194.106.151.85
194.106.192.3 194.106.216.70 194.107.107.172 194.106.195.52