Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cardiff

Region: Wales

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.162.6.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.162.6.40.			IN	A

;; AUTHORITY SECTION:
.			3	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024020401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 05 05:27:53 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 40.6.162.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.6.162.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.49.179 attackspam
Aug  7 01:31:53 OPSO sshd\[27778\]: Invalid user rd from 182.61.49.179 port 44666
Aug  7 01:31:53 OPSO sshd\[27778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179
Aug  7 01:31:55 OPSO sshd\[27778\]: Failed password for invalid user rd from 182.61.49.179 port 44666 ssh2
Aug  7 01:33:15 OPSO sshd\[27819\]: Invalid user release from 182.61.49.179 port 58316
Aug  7 01:33:15 OPSO sshd\[27819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.49.179
2019-08-07 11:18:21
217.133.133.125 attack
Automatic report - Port Scan Attack
2019-08-07 10:42:20
106.251.118.119 attack
Aug  7 03:31:56 ovpn sshd\[11876\]: Invalid user test from 106.251.118.119
Aug  7 03:31:56 ovpn sshd\[11876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.118.119
Aug  7 03:31:58 ovpn sshd\[11876\]: Failed password for invalid user test from 106.251.118.119 port 52324 ssh2
Aug  7 03:49:01 ovpn sshd\[15041\]: Invalid user xiong from 106.251.118.119
Aug  7 03:49:01 ovpn sshd\[15041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.118.119
2019-08-07 11:06:55
27.255.77.5 attackspambots
2019-08-06 16:39:29 dovecot_login authenticator failed for (7eM9VvB) [27.255.77.5]:49595 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=magoo@lerctr.org)
2019-08-06 16:39:46 dovecot_login authenticator failed for (0elveDsQ) [27.255.77.5]:53540 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=magoo@lerctr.org)
2019-08-06 16:40:07 dovecot_login authenticator failed for (DjSJZKXyx5) [27.255.77.5]:58908 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=magoo@lerctr.org)
...
2019-08-07 10:54:34
106.110.69.249 attack
23/tcp
[2019-08-06]1pkt
2019-08-07 11:09:34
217.114.218.18 attack
Aug  6 23:41:05 nginx sshd[14186]: Connection from 217.114.218.18 port 64476 on 10.23.102.80 port 22
Aug  6 23:41:06 nginx sshd[14186]: Received disconnect from 217.114.218.18 port 64476:11: Bye Bye [preauth]
2019-08-07 10:35:13
145.239.73.103 attackbots
Aug  6 23:41:01 ncomp sshd[8234]: Invalid user riina from 145.239.73.103
Aug  6 23:41:01 ncomp sshd[8234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.73.103
Aug  6 23:41:01 ncomp sshd[8234]: Invalid user riina from 145.239.73.103
Aug  6 23:41:03 ncomp sshd[8234]: Failed password for invalid user riina from 145.239.73.103 port 34554 ssh2
2019-08-07 10:36:45
103.236.253.28 attackbots
Aug  6 19:27:01 ny01 sshd[32414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.28
Aug  6 19:27:03 ny01 sshd[32414]: Failed password for invalid user henkpauwel from 103.236.253.28 port 36950 ssh2
Aug  6 19:30:08 ny01 sshd[32662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.236.253.28
2019-08-07 10:50:00
36.233.73.90 attack
23/tcp
[2019-08-06]1pkt
2019-08-07 11:09:08
191.53.248.145 attackspam
failed_logins
2019-08-07 11:20:40
102.156.255.179 attackbotsspam
wget call in url
2019-08-07 10:38:28
200.156.26.34 attackspam
Aug  6 23:39:29 xeon sshd[39285]: Failed password for invalid user felcia from 200.156.26.34 port 29025 ssh2
2019-08-07 10:55:04
89.248.172.85 attackspam
08/06/2019-21:54:30.620818 89.248.172.85 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 99
2019-08-07 10:28:36
189.171.15.135 attackbots
23/tcp
[2019-08-06]1pkt
2019-08-07 11:20:58
78.37.7.133 attackspam
23/tcp
[2019-08-06]1pkt
2019-08-07 10:57:10

Recently Reported IPs

20.58.132.197 200.117.66.134 6.147.26.66 84.75.203.211
6.209.140.119 6.246.147.122 208.150.193.128 201.195.49.61
201.187.198.174 10.96.186.39 209.137.224.198 201.228.210.195
10.106.112.99 101.169.13.211 101.76.24.167 209.155.215.12
201.74.230.12 157.84.150.220 159.248.180.187 159.57.219.111