Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Redmond

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.106.2.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;40.106.2.149.			IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100300 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 15:05:36 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 149.2.106.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.2.106.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.205.93.188 attackspambots
Jun  1 06:16:15 ubuntu sshd[27479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.205.93.188
Jun  1 06:16:17 ubuntu sshd[27479]: Failed password for invalid user kay from 111.205.93.188 port 38362 ssh2
Jun  1 06:19:11 ubuntu sshd[27552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.205.93.188
Jun  1 06:19:14 ubuntu sshd[27552]: Failed password for invalid user sm from 111.205.93.188 port 60946 ssh2
2019-10-08 19:07:46
111.19.162.80 attackspam
Sep  7 02:33:39 dallas01 sshd[1244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.162.80
Sep  7 02:33:41 dallas01 sshd[1244]: Failed password for invalid user test123 from 111.19.162.80 port 41854 ssh2
Sep  7 02:39:19 dallas01 sshd[2431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.19.162.80
2019-10-08 19:31:31
111.207.105.199 attackspam
2019-10-07 21:53:47,646 fail2ban.actions        [843]: NOTICE  [sshd] Ban 111.207.105.199
2019-10-08 00:58:04,554 fail2ban.actions        [843]: NOTICE  [sshd] Ban 111.207.105.199
2019-10-08 04:05:15,186 fail2ban.actions        [843]: NOTICE  [sshd] Ban 111.207.105.199
...
2019-10-08 19:04:21
159.89.55.240 attackspam
Oct  8 10:54:33 server sshd\[23494\]: User root from 159.89.55.240 not allowed because listed in DenyUsers
Oct  8 10:54:33 server sshd\[23494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.55.240  user=root
Oct  8 10:54:36 server sshd\[23494\]: Failed password for invalid user root from 159.89.55.240 port 43384 ssh2
Oct  8 10:58:41 server sshd\[5655\]: User root from 159.89.55.240 not allowed because listed in DenyUsers
Oct  8 10:58:41 server sshd\[5655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.55.240  user=root
2019-10-08 19:25:22
184.105.139.105 attack
firewall-block, port(s): 177/udp
2019-10-08 19:44:02
139.155.121.230 attackspambots
Oct  8 12:33:15 legacy sshd[6704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.121.230
Oct  8 12:33:17 legacy sshd[6704]: Failed password for invalid user Human123 from 139.155.121.230 port 35070 ssh2
Oct  8 12:37:46 legacy sshd[6842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.121.230
...
2019-10-08 19:24:35
111.166.23.63 attackbots
Apr 25 20:15:24 ubuntu sshd[26950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.166.23.63
Apr 25 20:15:26 ubuntu sshd[26950]: Failed password for invalid user jenkins from 111.166.23.63 port 6490 ssh2
Apr 25 20:18:28 ubuntu sshd[27015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.166.23.63
2019-10-08 19:42:28
171.99.253.119 attackbotsspam
" "
2019-10-08 19:12:43
159.203.190.189 attack
2019-10-08T11:22:13.130448shield sshd\[11640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189  user=root
2019-10-08T11:22:14.869518shield sshd\[11640\]: Failed password for root from 159.203.190.189 port 39937 ssh2
2019-10-08T11:25:09.889808shield sshd\[12425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189  user=root
2019-10-08T11:25:12.124508shield sshd\[12425\]: Failed password for root from 159.203.190.189 port 57246 ssh2
2019-10-08T11:28:14.619203shield sshd\[13219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.190.189  user=root
2019-10-08 19:33:30
179.191.14.58 attack
Unauthorised access (Oct  8) SRC=179.191.14.58 LEN=44 TTL=47 ID=63088 TCP DPT=8080 WINDOW=10789 SYN
2019-10-08 19:06:53
222.252.39.180 attack
firewall-block, port(s): 8000/tcp
2019-10-08 19:36:34
111.183.120.105 attackbots
Sep 16 06:30:59 dallas01 sshd[17688]: Failed password for root from 111.183.120.105 port 45993 ssh2
Sep 16 06:31:01 dallas01 sshd[17688]: Failed password for root from 111.183.120.105 port 45993 ssh2
Sep 16 06:31:03 dallas01 sshd[17688]: Failed password for root from 111.183.120.105 port 45993 ssh2
Sep 16 06:31:06 dallas01 sshd[17688]: Failed password for root from 111.183.120.105 port 45993 ssh2
2019-10-08 19:37:28
1.179.246.244 attack
Oct805:31:42server2pure-ftpd:\(\?@61.216.159.55\)[WARNING]Authenticationfailedforuser[root]Oct805:31:35server2pure-ftpd:\(\?@61.216.159.55\)[WARNING]Authenticationfailedforuser[root]Oct805:50:44server2pure-ftpd:\(\?@125.212.192.140\)[WARNING]Authenticationfailedforuser[root]Oct805:50:38server2pure-ftpd:\(\?@125.212.192.140\)[WARNING]Authenticationfailedforuser[root]Oct805:11:29server2pure-ftpd:\(\?@91.134.248.211\)[WARNING]Authenticationfailedforuser[root]Oct805:11:36server2pure-ftpd:\(\?@206.189.136.117\)[WARNING]Authenticationfailedforuser[root]Oct805:11:31server2pure-ftpd:\(\?@165.227.95.155\)[WARNING]Authenticationfailedforuser[root]Oct805:11:35server2pure-ftpd:\(\?@1.179.246.244\)[WARNING]Authenticationfailedforuser[root]IPAddressesBlocked:61.216.159.55\(TW/Taiwan/61-216-159-55.hinet-ip.hinet.net\)125.212.192.140\(VN/Vietnam/-\)91.134.248.211\(FR/France/gwc.cluster026.hosting.ovh.net\)206.189.136.117\(IN/India/-\)165.227.95.155\(US/UnitedStates/315398.cloudwaysapps.com\)
2019-10-08 19:19:13
134.209.252.119 attack
$f2bV_matches
2019-10-08 19:28:19
159.203.201.116 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-08 19:44:19

Recently Reported IPs

42.176.99.83 109.26.88.215 12.31.246.169 24.23.180.102
2a02:587:5401:4e00:29b5:6baa:e91e:bf0d 41.46.64.13 199.96.140.66 43.37.191.221
164.209.11.199 118.233.153.250 198.81.213.58 163.56.98.5
212.208.218.177 3.32.227.228 106.108.187.131 176.109.238.62
27.246.127.115 135.80.61.108 185.39.199.124 104.219.227.209