Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.109.145.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.109.145.40.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 09:52:28 CST 2022
;; MSG SIZE  rcvd: 107
Host info
40.145.109.222.in-addr.arpa domain name pointer mail.vitzrocnc.com.
40.145.109.222.in-addr.arpa domain name pointer mail.wetech21.co.kr.
40.145.109.222.in-addr.arpa domain name pointer mail.vitzrosys.net.
40.145.109.222.in-addr.arpa domain name pointer smtp.vitzrosys.net.
40.145.109.222.in-addr.arpa domain name pointer smtp.vitzro.com.
40.145.109.222.in-addr.arpa domain name pointer smtp.vitzrosys.com.
40.145.109.222.in-addr.arpa domain name pointer smtp.vitzrocnc.com.
40.145.109.222.in-addr.arpa domain name pointer smtp.wetech21.co.kr.
40.145.109.222.in-addr.arpa domain name pointer mail.vitzro.com.
40.145.109.222.in-addr.arpa domain name pointer mail.vitzrosys.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.145.109.222.in-addr.arpa	name = smtp.vitzro.com.
40.145.109.222.in-addr.arpa	name = smtp.vitzrosys.com.
40.145.109.222.in-addr.arpa	name = smtp.vitzrocnc.com.
40.145.109.222.in-addr.arpa	name = smtp.wetech21.co.kr.
40.145.109.222.in-addr.arpa	name = mail.vitzro.com.
40.145.109.222.in-addr.arpa	name = mail.vitzrosys.com.
40.145.109.222.in-addr.arpa	name = mail.vitzrocnc.com.
40.145.109.222.in-addr.arpa	name = mail.wetech21.co.kr.
40.145.109.222.in-addr.arpa	name = mail.vitzrosys.net.
40.145.109.222.in-addr.arpa	name = smtp.vitzrosys.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.51.39.205 attackspam
Automatic report - Banned IP Access
2020-01-08 19:34:33
144.76.6.230 attack
20 attempts against mh-misbehave-ban on milky.magehost.pro
2020-01-08 19:23:17
124.205.133.66 attack
2020-01-06T04:44:20.186579***.arvenenaske.de sshd[53168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.133.66  user=r.r
2020-01-06T04:44:21.728890***.arvenenaske.de sshd[53168]: Failed password for r.r from 124.205.133.66 port 37011 ssh2
2020-01-06T04:55:56.408890***.arvenenaske.de sshd[53178]: Invalid user gbj from 124.205.133.66 port 11528
2020-01-06T04:55:56.415201***.arvenenaske.de sshd[53178]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.133.66 user=gbj
2020-01-06T04:55:56.416088***.arvenenaske.de sshd[53178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.205.133.66
2020-01-06T04:55:56.408890***.arvenenaske.de sshd[53178]: Invalid user gbj from 124.205.133.66 port 11528
2020-01-06T04:55:57.837923***.arvenenaske.de sshd[53178]: Failed password for invalid user gbj from 124.205.133.66 port 11528 ssh2
2020-01-06T04:58:56.130........
------------------------------
2020-01-08 19:25:51
198.211.123.183 attackbotsspam
$f2bV_matches
2020-01-08 19:40:03
82.76.125.43 attackbotsspam
unauthorized connection attempt
2020-01-08 19:33:13
42.119.46.237 attackspambots
Unauthorized connection attempt from IP address 42.119.46.237 on Port 445(SMB)
2020-01-08 19:26:12
45.82.34.90 attack
Brute force attempt
2020-01-08 19:29:55
200.193.44.186 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2020-01-08 19:44:21
144.131.134.105 attackbots
Unauthorized connection attempt detected from IP address 144.131.134.105 to port 2220 [J]
2020-01-08 19:25:20
87.213.33.230 attackbots
1578458794 - 01/08/2020 05:46:34 Host: 87.213.33.230/87.213.33.230 Port: 445 TCP Blocked
2020-01-08 19:30:15
185.176.27.14 attackbots
Jan  8 12:12:28 debian-2gb-nbg1-2 kernel: \[741263.619904\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=34878 PROTO=TCP SPT=56395 DPT=12985 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-08 19:34:47
143.0.251.194 attackbotsspam
1578458779 - 01/08/2020 05:46:19 Host: 143.0.251.194/143.0.251.194 Port: 445 TCP Blocked
2020-01-08 19:45:52
118.172.19.148 attack
Unauthorized connection attempt from IP address 118.172.19.148 on Port 445(SMB)
2020-01-08 19:59:12
14.231.184.180 attackspambots
Unauthorized connection attempt from IP address 14.231.184.180 on Port 445(SMB)
2020-01-08 19:37:41
182.253.170.62 attackspam
20/1/8@05:07:36: FAIL: Alarm-Network address from=182.253.170.62
...
2020-01-08 19:27:45

Recently Reported IPs

84.223.71.246 233.27.153.119 208.118.21.147 97.50.185.165
46.175.160.18 81.169.207.126 247.193.249.225 193.206.240.159
213.159.6.16 203.146.0.51 87.242.15.167 3.17.253.24
203.109.42.8 27.8.130.65 196.64.119.55 48.77.248.74
18.156.166.218 41.121.219.106 186.185.5.88 223.199.215.25