Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.40.34.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.40.34.242.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 16:28:48 CST 2022
;; MSG SIZE  rcvd: 104
Host info
242.34.40.2.in-addr.arpa domain name pointer net-2-40-34-242.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.34.40.2.in-addr.arpa	name = net-2-40-34-242.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.118.188.136 attack
$f2bV_matches
2020-05-14 14:31:11
106.54.155.35 attackspambots
Bruteforce detected by fail2ban
2020-05-14 14:49:57
129.204.2.157 attack
Invalid user qt from 129.204.2.157 port 50466
2020-05-14 14:44:14
106.58.220.87 attack
(pop3d) Failed POP3 login from 106.58.220.87 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 14 11:03:02 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=106.58.220.87, lip=5.63.12.44, session=
2020-05-14 15:05:02
46.101.151.52 attackbots
k+ssh-bruteforce
2020-05-14 15:01:16
222.186.175.169 attackbotsspam
2020-05-14T08:38:27.069813sd-86998 sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-05-14T08:38:29.563234sd-86998 sshd[10125]: Failed password for root from 222.186.175.169 port 29280 ssh2
2020-05-14T08:38:32.815462sd-86998 sshd[10125]: Failed password for root from 222.186.175.169 port 29280 ssh2
2020-05-14T08:38:27.069813sd-86998 sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-05-14T08:38:29.563234sd-86998 sshd[10125]: Failed password for root from 222.186.175.169 port 29280 ssh2
2020-05-14T08:38:32.815462sd-86998 sshd[10125]: Failed password for root from 222.186.175.169 port 29280 ssh2
2020-05-14T08:38:27.069813sd-86998 sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2020-05-14T08:38:29.563234sd-86998 sshd[10125]: Failed password for roo
...
2020-05-14 14:43:10
115.127.69.218 attackbotsspam
DATE:2020-05-14 05:51:47, IP:115.127.69.218, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-05-14 14:36:30
111.229.34.121 attackspambots
2020-05-14T08:03:49.618469sd-86998 sshd[5789]: Invalid user ods from 111.229.34.121 port 53166
2020-05-14T08:03:49.625684sd-86998 sshd[5789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.34.121
2020-05-14T08:03:49.618469sd-86998 sshd[5789]: Invalid user ods from 111.229.34.121 port 53166
2020-05-14T08:03:51.848060sd-86998 sshd[5789]: Failed password for invalid user ods from 111.229.34.121 port 53166 ssh2
2020-05-14T08:07:56.947220sd-86998 sshd[6350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.34.121  user=root
2020-05-14T08:07:59.746480sd-86998 sshd[6350]: Failed password for root from 111.229.34.121 port 44906 ssh2
...
2020-05-14 14:58:56
218.92.0.173 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-14 14:29:06
106.12.13.247 attackbots
2020-05-13T23:54:20.990933linuxbox-skyline sshd[159047]: Invalid user linuxtester2 from 106.12.13.247 port 49182
...
2020-05-14 14:59:14
218.108.119.132 attack
prod6
...
2020-05-14 15:03:09
182.253.8.72 attack
Did not receive identification string
2020-05-14 14:32:01
188.165.24.200 attack
May 14 02:48:25 ny01 sshd[32726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.24.200
May 14 02:48:27 ny01 sshd[32726]: Failed password for invalid user deploy from 188.165.24.200 port 51920 ssh2
May 14 02:51:46 ny01 sshd[649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.24.200
2020-05-14 14:53:08
119.96.108.92 attackspam
(pop3d) Failed POP3 login from 119.96.108.92 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 14 11:03:13 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 11 secs): user=, method=PLAIN, rip=119.96.108.92, lip=5.63.12.44, session=
2020-05-14 15:04:43
103.52.52.22 attackbotsspam
(sshd) Failed SSH login from 103.52.52.22 (IN/India/-): 5 in the last 3600 secs
2020-05-14 14:38:58

Recently Reported IPs

2.38.180.157 2.43.10.208 2.44.181.187 2.42.74.102
2.44.146.183 2.39.125.201 2.47.39.208 2.47.198.45
2.47.232.71 2.50.136.187 2.50.137.150 2.50.136.90
2.45.13.131 2.50.140.199 2.50.156.218 2.50.177.228
2.50.180.50 2.51.28.149 2.50.173.173 2.50.29.198