Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.40.216.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.40.216.11.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:17:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
11.216.40.194.in-addr.arpa domain name pointer chm-paylbvip11-p.nzzmg.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.216.40.194.in-addr.arpa	name = chm-paylbvip11-p.nzzmg.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.211.123.183 attackbotsspam
Tried sshing with brute force.
2019-11-18 06:28:32
115.87.108.154 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-18 06:30:32
180.150.189.206 attack
Nov 17 05:46:03 php1 sshd\[29605\]: Invalid user snapple from 180.150.189.206
Nov 17 05:46:03 php1 sshd\[29605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.189.206
Nov 17 05:46:05 php1 sshd\[29605\]: Failed password for invalid user snapple from 180.150.189.206 port 38137 ssh2
Nov 17 05:50:50 php1 sshd\[29978\]: Invalid user starlene from 180.150.189.206
Nov 17 05:50:50 php1 sshd\[29978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.150.189.206
2019-11-18 06:17:17
117.66.243.77 attackbots
CyberHackers.eu > SSH Bruteforce attempt!
2019-11-18 06:36:00
180.101.125.76 attack
18 failed attempt(s) in the last 24h
2019-11-18 06:36:52
124.122.50.117 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-18 06:13:03
80.96.228.138 attack
Attempted to connect 2 times to port 80 TCP
2019-11-18 06:49:09
87.197.190.229 attackbotsspam
fire
2019-11-18 06:47:35
197.255.185.92 attackbotsspam
Automatic report - Port Scan Attack
2019-11-18 06:14:09
1.179.146.156 attack
Nov 17 12:38:41 Tower sshd[6080]: Connection from 1.179.146.156 port 46834 on 192.168.10.220 port 22
Nov 17 12:38:43 Tower sshd[6080]: Invalid user mh from 1.179.146.156 port 46834
Nov 17 12:38:43 Tower sshd[6080]: error: Could not get shadow information for NOUSER
Nov 17 12:38:43 Tower sshd[6080]: Failed password for invalid user mh from 1.179.146.156 port 46834 ssh2
Nov 17 12:38:43 Tower sshd[6080]: Received disconnect from 1.179.146.156 port 46834:11: Bye Bye [preauth]
Nov 17 12:38:43 Tower sshd[6080]: Disconnected from invalid user mh 1.179.146.156 port 46834 [preauth]
2019-11-18 06:25:07
189.126.199.194 attackspambots
Nov 14 15:43:54 ihweb003 sshd[26527]: Connection from 189.126.199.194 port 56904 on 139.59.173.177 port 22
Nov 14 15:43:54 ihweb003 sshd[26527]: Did not receive identification string from 189.126.199.194 port 56904
Nov 14 15:49:24 ihweb003 sshd[27581]: Connection from 189.126.199.194 port 47256 on 139.59.173.177 port 22
Nov 14 15:49:25 ihweb003 sshd[27581]: Address 189.126.199.194 maps to mail.acsc.org.br, but this does not map back to the address.
Nov 14 15:49:25 ihweb003 sshd[27581]: User r.r from 189.126.199.194 not allowed because none of user's groups are listed in AllowGroups
Nov 14 15:49:25 ihweb003 sshd[27581]: Received disconnect from 189.126.199.194 port 47256:11: Normal Shutdown, Thank you for playing [preauth]
Nov 14 15:49:25 ihweb003 sshd[27581]: Disconnected from 189.126.199.194 port 47256 [preauth]
Nov 14 15:51:17 ihweb003 sshd[28015]: Connection from 189.126.199.194 port 44478 on 139.59.173.177 port 22
Nov 14 15:51:18 ihweb003 sshd[28015]: Address 189.12........
-------------------------------
2019-11-18 06:21:16
41.210.15.246 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-18 06:33:20
110.49.71.245 attack
Invalid user qwertzuiop from 110.49.71.245 port 36041
2019-11-18 06:33:45
113.236.250.237 attackspam
port scan and connect, tcp 23 (telnet)
2019-11-18 06:40:06
61.85.44.145 attack
Fail2Ban Ban Triggered
2019-11-18 06:12:47

Recently Reported IPs

194.4.58.39 194.40.216.15 194.40.218.30 194.40.245.176
194.40.216.12 194.40.144.142 194.42.1.70 194.41.48.12
194.41.48.13 194.41.184.148 194.41.48.10 194.41.226.24
194.41.166.40 194.41.12.17 194.42.75.211 194.44.10.9
194.42.194.218 194.44.11.131 194.44.116.57 194.44.11.130