Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 228.108.134.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;228.108.134.40.			IN	A

;; AUTHORITY SECTION:
.			338	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:54:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 40.134.108.228.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 40.134.108.228.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.226.103 attackspam
2020-05-26T13:32:13.404885mail.thespaminator.com sshd[3168]: Failed password for root from 37.49.226.103 port 47472 ssh2
2020-05-26T13:32:14.391822mail.thespaminator.com sshd[3171]: Invalid user admin from 37.49.226.103 port 54246
...
2020-05-27 01:48:42
213.108.134.156 attackbotsspam
RDP Brute-Force
2020-05-27 01:26:05
45.55.88.94 attack
May 26 10:31:02 dignus sshd[17899]: Invalid user postgres from 45.55.88.94 port 38587
May 26 10:31:02 dignus sshd[17899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
May 26 10:31:04 dignus sshd[17899]: Failed password for invalid user postgres from 45.55.88.94 port 38587 ssh2
May 26 10:36:03 dignus sshd[18166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94  user=root
May 26 10:36:04 dignus sshd[18166]: Failed password for root from 45.55.88.94 port 42021 ssh2
...
2020-05-27 01:55:55
94.133.55.77 attack
Brute forcing RDP port 3389
2020-05-27 01:53:43
212.237.1.50 attack
May 26 17:52:47 abendstille sshd\[14842\]: Invalid user Sweex from 212.237.1.50
May 26 17:52:47 abendstille sshd\[14842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.1.50
May 26 17:52:50 abendstille sshd\[14842\]: Failed password for invalid user Sweex from 212.237.1.50 port 43655 ssh2
May 26 17:55:47 abendstille sshd\[17897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.1.50  user=root
May 26 17:55:49 abendstille sshd\[17897\]: Failed password for root from 212.237.1.50 port 40728 ssh2
...
2020-05-27 01:36:32
113.161.150.177 attackspam
20/5/26@11:55:41: FAIL: Alarm-Network address from=113.161.150.177
...
2020-05-27 01:42:23
164.132.108.195 attackspambots
May 26 17:01:00 game-panel sshd[11673]: Failed password for root from 164.132.108.195 port 48994 ssh2
May 26 17:03:32 game-panel sshd[11754]: Failed password for root from 164.132.108.195 port 36698 ssh2
May 26 17:05:57 game-panel sshd[11842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.108.195
2020-05-27 01:15:58
141.144.61.39 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-27 01:41:28
89.163.143.8 attackbotsspam
Automatic report - Banned IP Access
2020-05-27 01:47:27
78.149.218.1 attackbotsspam
Unauthorised access (May 26) SRC=78.149.218.1 LEN=40 TTL=57 ID=47945 TCP DPT=23 WINDOW=20223 SYN
2020-05-27 01:35:59
45.82.68.157 attackbots
 TCP (SYN) 45.82.68.157:59700 -> port 1080, len 52
2020-05-27 01:37:40
49.234.189.19 attackbots
SSH bruteforce
2020-05-27 01:29:49
27.150.22.44 attackspambots
k+ssh-bruteforce
2020-05-27 01:56:51
51.255.47.133 attack
May 26 19:55:30 root sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-51-255-47.eu  user=root
May 26 19:55:31 root sshd[31880]: Failed password for root from 51.255.47.133 port 44438 ssh2
...
2020-05-27 01:33:15
125.137.191.215 attack
(sshd) Failed SSH login from 125.137.191.215 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 26 18:53:37 srv sshd[24439]: Invalid user ftpuser from 125.137.191.215 port 56480
May 26 18:53:39 srv sshd[24439]: Failed password for invalid user ftpuser from 125.137.191.215 port 56480 ssh2
May 26 19:01:53 srv sshd[24670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215  user=root
May 26 19:01:55 srv sshd[24670]: Failed password for root from 125.137.191.215 port 38032 ssh2
May 26 19:04:28 srv sshd[24730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215  user=root
2020-05-27 01:30:16

Recently Reported IPs

16.60.20.198 122.226.204.96 211.184.99.43 242.96.65.4
131.229.101.168 11.112.96.139 129.230.252.163 120.190.94.228
207.119.148.191 1.222.173.222 127.241.42.33 129.172.241.62
232.193.229.237 110.155.77.178 208.248.231.255 16.123.255.230
139.17.120.3 255.184.133.49 159.60.249.126 179.55.164.223