Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ethiopia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.189.40.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.189.40.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 19:35:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 216.40.189.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.40.189.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.247.102.100 attackbotsspam
Aug  8 02:26:22 webhost01 sshd[18547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.247.102.100
Aug  8 02:26:24 webhost01 sshd[18547]: Failed password for invalid user alex from 148.247.102.100 port 49308 ssh2
...
2019-08-08 03:28:29
202.80.219.120 attack
Wordpress attack
2019-08-08 02:54:31
144.217.165.133 attack
Aug  7 19:43:55 h2177944 sshd\[32083\]: Invalid user USERID from 144.217.165.133 port 52794
Aug  7 19:43:55 h2177944 sshd\[32083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.165.133
Aug  7 19:43:57 h2177944 sshd\[32083\]: Failed password for invalid user USERID from 144.217.165.133 port 52794 ssh2
Aug  7 19:44:01 h2177944 sshd\[32085\]: Invalid user Administrator from 144.217.165.133 port 55270
...
2019-08-08 03:25:34
179.108.245.140 attackspambots
Aug  7 19:42:08 xeon postfix/smtpd[15806]: warning: unknown[179.108.245.140]: SASL PLAIN authentication failed: authentication failure
2019-08-08 03:25:09
221.152.217.113 attack
Too many connections or unauthorized access detected from Yankee banned ip
2019-08-08 03:26:20
113.12.84.131 attackspambots
SMB Server BruteForce Attack
2019-08-08 02:45:23
35.201.243.170 attack
Aug  7 20:31:18 vps691689 sshd[27220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.201.243.170
Aug  7 20:31:21 vps691689 sshd[27220]: Failed password for invalid user rd from 35.201.243.170 port 1606 ssh2
...
2019-08-08 02:56:42
36.71.169.51 attackspambots
Automatic report - Port Scan Attack
2019-08-08 03:06:21
189.109.247.150 attack
Aug  7 19:44:15 [host] sshd[14996]: Invalid user hb from 189.109.247.150
Aug  7 19:44:15 [host] sshd[14996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.109.247.150
Aug  7 19:44:17 [host] sshd[14996]: Failed password for invalid user hb from 189.109.247.150 port 43306 ssh2
2019-08-08 03:15:28
200.124.228.231 attackbots
Automatic report - Port Scan Attack
2019-08-08 03:15:45
165.227.150.158 attackbots
Aug  7 15:08:14 vps200512 sshd\[17054\]: Invalid user webmaster from 165.227.150.158
Aug  7 15:08:14 vps200512 sshd\[17054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158
Aug  7 15:08:16 vps200512 sshd\[17054\]: Failed password for invalid user webmaster from 165.227.150.158 port 15571 ssh2
Aug  7 15:12:31 vps200512 sshd\[17164\]: Invalid user plagscan from 165.227.150.158
Aug  7 15:12:31 vps200512 sshd\[17164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.150.158
2019-08-08 03:23:35
51.68.173.108 attackspambots
Aug  7 21:10:43 vps647732 sshd[8856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.173.108
Aug  7 21:10:45 vps647732 sshd[8856]: Failed password for invalid user catchall from 51.68.173.108 port 35006 ssh2
...
2019-08-08 03:27:42
112.85.42.237 attackbotsspam
Aug  8 00:09:00 vibhu-HP-Z238-Microtower-Workstation sshd\[27815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Aug  8 00:09:02 vibhu-HP-Z238-Microtower-Workstation sshd\[27815\]: Failed password for root from 112.85.42.237 port 30094 ssh2
Aug  8 00:09:45 vibhu-HP-Z238-Microtower-Workstation sshd\[27906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
Aug  8 00:09:47 vibhu-HP-Z238-Microtower-Workstation sshd\[27906\]: Failed password for root from 112.85.42.237 port 26830 ssh2
Aug  8 00:10:26 vibhu-HP-Z238-Microtower-Workstation sshd\[27922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
...
2019-08-08 02:54:56
113.57.212.63 attack
Aug  7 17:48:08 sshgateway sshd\[3844\]: Invalid user ubuntu from 113.57.212.63
Aug  7 17:48:08 sshgateway sshd\[3844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.212.63
Aug  7 17:48:10 sshgateway sshd\[3844\]: Failed password for invalid user ubuntu from 113.57.212.63 port 11778 ssh2
2019-08-08 03:12:32
177.20.168.234 attack
Aug  7 19:45:26 v22018076622670303 sshd\[18962\]: Invalid user sniffer from 177.20.168.234 port 59179
Aug  7 19:45:26 v22018076622670303 sshd\[18962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.20.168.234
Aug  7 19:45:28 v22018076622670303 sshd\[18962\]: Failed password for invalid user sniffer from 177.20.168.234 port 59179 ssh2
...
2019-08-08 02:48:34

Recently Reported IPs

94.235.118.75 23.83.88.12 5.146.128.12 75.85.108.240
226.11.220.172 15.126.16.22 159.194.168.145 26.216.151.112
170.38.200.43 136.13.98.238 164.35.214.33 59.213.157.178
109.170.69.86 221.185.209.37 53.194.151.212 88.118.144.124
61.126.156.59 154.157.70.137 232.235.138.70 67.25.208.198