Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.149.114.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.149.114.40.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 04:56:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
40.114.149.222.in-addr.arpa domain name pointer p9040-ipadfx21sasajima.aichi.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.114.149.222.in-addr.arpa	name = p9040-ipadfx21sasajima.aichi.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.20.133.77 attack
scan z
2020-05-27 05:59:46
36.89.67.186 attackspambots
May 26 18:14:12 server sshd[41783]: Failed password for root from 36.89.67.186 port 56864 ssh2
May 26 18:15:58 server sshd[43117]: Failed password for invalid user vcoadmin from 36.89.67.186 port 52456 ssh2
May 26 18:16:55 server sshd[44040]: Failed password for root from 36.89.67.186 port 35568 ssh2
2020-05-27 05:44:37
176.113.161.40 attack
nginx-botsearch jail
2020-05-27 05:59:20
82.65.35.189 attackbots
May 26 18:21:41 haigwepa sshd[22735]: Failed password for root from 82.65.35.189 port 42798 ssh2
...
2020-05-27 05:47:54
36.111.182.123 attackbots
May 26 20:25:21 vmd48417 sshd[5121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.123
2020-05-27 05:34:08
185.51.201.115 attack
Invalid user dean from 185.51.201.115 port 43718
2020-05-27 06:00:37
165.16.80.122 attack
Unauthorized SSH login attempts
2020-05-27 05:38:44
50.112.47.183 attackbots
Unsubscribe is not honored and I continue to be a target of fivepikecat.com
2020-05-27 05:57:55
60.12.221.84 attackspambots
$f2bV_matches
2020-05-27 06:00:08
96.127.179.156 attackbots
May 26 19:25:44 odroid64 sshd\[13710\]: User root from 96.127.179.156 not allowed because not listed in AllowUsers
May 26 19:25:44 odroid64 sshd\[13710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.127.179.156  user=root
...
2020-05-27 05:39:16
45.138.100.103 attackbots
Chat Spam
2020-05-27 05:44:19
68.183.81.243 attackspam
Bruteforce detected by fail2ban
2020-05-27 05:45:31
59.27.124.26 attack
Automatic report - Banned IP Access
2020-05-27 05:55:57
106.54.76.189 attackbotsspam
$f2bV_matches
2020-05-27 06:11:59
45.114.85.82 attackspambots
(sshd) Failed SSH login from 45.114.85.82 (BD/Bangladesh/-): 5 in the last 3600 secs
2020-05-27 06:07:15

Recently Reported IPs

204.85.147.239 3.154.220.113 149.158.148.139 11.249.8.147
145.188.223.69 154.41.53.145 32.74.1.52 177.69.184.81
101.6.57.184 45.53.108.203 121.158.60.17 236.78.149.93
81.221.157.168 104.98.20.27 116.230.164.191 207.154.177.31
23.75.154.227 2.125.7.200 53.188.98.138 76.79.176.194