Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.124.98.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34497
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.124.98.40.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012700 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 27 18:29:04 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 40.98.124.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.98.124.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.89.252.251 attackspambots
POST /inc/md5.asp HTTP/1.1
2020-08-09 07:21:01
121.122.81.195 attackbots
DATE:2020-08-08 22:56:33,IP:121.122.81.195,MATCHES:10,PORT:ssh
2020-08-09 07:30:46
72.179.104.83 attackspam
SSH User Authentication Brute Force Attempt , PTR: 072-179-104-083.res.spectrum.com.
2020-08-09 07:32:21
111.229.128.9 attackspambots
Aug  8 17:18:43 vps46666688 sshd[4550]: Failed password for root from 111.229.128.9 port 33238 ssh2
...
2020-08-09 07:55:15
83.13.19.85 attack
Tried sshing with brute force.
2020-08-09 07:42:35
103.151.191.28 attackspambots
Aug  8 23:01:12 IngegnereFirenze sshd[20342]: User root from 103.151.191.28 not allowed because not listed in AllowUsers
...
2020-08-09 07:43:40
218.92.0.223 attackspambots
2020-08-08T23:28:29.484438vps1033 sshd[23995]: Failed password for root from 218.92.0.223 port 10675 ssh2
2020-08-08T23:28:36.106789vps1033 sshd[23995]: Failed password for root from 218.92.0.223 port 10675 ssh2
2020-08-08T23:28:42.202148vps1033 sshd[23995]: Failed password for root from 218.92.0.223 port 10675 ssh2
2020-08-08T23:28:57.144030vps1033 sshd[25098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
2020-08-08T23:28:59.257319vps1033 sshd[25098]: Failed password for root from 218.92.0.223 port 4600 ssh2
...
2020-08-09 07:36:22
106.53.241.29 attackbots
$f2bV_matches
2020-08-09 07:25:04
157.230.220.179 attackspambots
*Port Scan* detected from 157.230.220.179 (US/United States/New Jersey/North Bergen/-). 4 hits in the last 290 seconds
2020-08-09 07:30:30
106.13.13.188 attackbotsspam
2020-08-08T15:25:05.922092morrigan.ad5gb.com sshd[430310]: Failed password for root from 106.13.13.188 port 51042 ssh2
2020-08-08T15:25:06.458095morrigan.ad5gb.com sshd[430310]: Disconnected from authenticating user root 106.13.13.188 port 51042 [preauth]
2020-08-09 07:35:49
40.70.133.92 attack
(mod_security) mod_security (id:930130) triggered by 40.70.133.92 (US/-/-): 1 in the last 600 secs; Ports: *; Direction: inout; Trigger: LF_MODSEC; Logs: 2020/08/08 23:39:28 [error] 3682#0: *2677 [client 40.70.133.92] ModSecurity: Access denied with code 406 (phase 2). Matched "Operator `PmFromFile' with parameter `restricted-files.data' against variable `REQUEST_FILENAME' (Value: `/.env' ) [file "/etc/modsecurity.d/REQUEST-930-APPLICATION-ATTACK-LFI.conf"] [line "105"] [id "930130"] [rev ""] [msg "Restricted File Access Attempt"] [redacted] [severity "2"] [ver "OWASP_CRS/3.3.0"] [maturity "0"] [accuracy "0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-lfi"] [tag "paranoia-level/1"] [tag "OWASP_CRS"] [tag "capec/1000/255/153/126"] [tag "PCI/6.5.4"] [redacted] [uri "/.env"] [unique_id "159692276821.941514"] [ref "o0,5v4,5t:utf8toUnicode,t:urlDecodeUni,t:normalizePathWin,t:lowercase"], client: 40.70.133.92, [redacted] request: "GET /.env HTTP/1.1" [redacted]
2020-08-09 07:52:30
64.227.126.134 attack
Aug  8 17:36:26 mail sshd\[22223\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.126.134  user=root
...
2020-08-09 07:30:03
187.189.15.119 attackbots
*Port Scan* detected from 187.189.15.119 (MX/Mexico/Mexico City/Mexico City (Jardines del Pedregal)/fixed-187-189-15-119.totalplay.net). 4 hits in the last 80 seconds
2020-08-09 07:26:28
167.172.156.227 attackbots
2020-08-09T01:41:26.826252amanda2.illicoweb.com sshd\[38035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.156.227  user=root
2020-08-09T01:41:28.762450amanda2.illicoweb.com sshd\[38035\]: Failed password for root from 167.172.156.227 port 41316 ssh2
2020-08-09T01:45:31.198223amanda2.illicoweb.com sshd\[38416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.156.227  user=root
2020-08-09T01:45:33.435397amanda2.illicoweb.com sshd\[38416\]: Failed password for root from 167.172.156.227 port 57218 ssh2
2020-08-09T01:49:08.900648amanda2.illicoweb.com sshd\[38680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.156.227  user=root
...
2020-08-09 07:56:03
212.227.216.50 attackspambots
08.08.2020 22:25:20 - Wordpress fail 
Detected by ELinOX-ALM
2020-08-09 07:23:02

Recently Reported IPs

246.141.208.75 109.74.50.180 170.129.214.68 160.92.233.183
145.56.52.230 137.162.238.227 20.139.110.154 152.172.11.44
36.7.188.60 36.46.202.95 252.160.11.25 149.154.194.249
207.8.228.109 178.157.206.152 36.49.111.56 156.113.110.104
99.83.152.62 95.1.186.100 29.13.99.240 217.65.137.198