Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.106.211.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.106.211.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:14:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 159.211.106.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.211.106.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.235.119 attack
SSH Invalid Login
2020-05-15 06:28:26
36.156.157.227 attackbotsspam
Brute-force attempt banned
2020-05-15 06:50:56
140.143.56.61 attackspambots
May 15 00:10:26 electroncash sshd[48534]: Invalid user leng from 140.143.56.61 port 48460
May 15 00:10:26 electroncash sshd[48534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.56.61 
May 15 00:10:26 electroncash sshd[48534]: Invalid user leng from 140.143.56.61 port 48460
May 15 00:10:27 electroncash sshd[48534]: Failed password for invalid user leng from 140.143.56.61 port 48460 ssh2
May 15 00:14:32 electroncash sshd[49657]: Invalid user nnn from 140.143.56.61 port 38184
...
2020-05-15 06:34:46
104.131.189.185 attack
Invalid user omsagent from 104.131.189.185 port 55478
2020-05-15 06:34:09
106.54.182.239 attack
sshd jail - ssh hack attempt
2020-05-15 06:22:42
51.91.19.92 attack
51.91.19.92 - - [10/Dec/2019:17:52:04 +0100] "GET /wp-login.php HTTP/1.1" 404 468
...
2020-05-15 06:41:27
157.230.32.164 attack
May 15 00:26:34 piServer sshd[5198]: Failed password for root from 157.230.32.164 port 57368 ssh2
May 15 00:30:36 piServer sshd[5492]: Failed password for root from 157.230.32.164 port 36786 ssh2
May 15 00:34:38 piServer sshd[5798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.32.164 
...
2020-05-15 06:46:30
27.158.229.215 attack
Telnet Server BruteForce Attack
2020-05-15 06:31:21
45.178.1.37 attackspambots
Bruteforce detected by fail2ban
2020-05-15 06:44:08
112.85.42.181 attack
2020-05-14T22:30:45.913153abusebot-3.cloudsearch.cf sshd[21770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
2020-05-14T22:30:47.792501abusebot-3.cloudsearch.cf sshd[21770]: Failed password for root from 112.85.42.181 port 27739 ssh2
2020-05-14T22:30:50.816506abusebot-3.cloudsearch.cf sshd[21770]: Failed password for root from 112.85.42.181 port 27739 ssh2
2020-05-14T22:30:45.913153abusebot-3.cloudsearch.cf sshd[21770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
2020-05-14T22:30:47.792501abusebot-3.cloudsearch.cf sshd[21770]: Failed password for root from 112.85.42.181 port 27739 ssh2
2020-05-14T22:30:50.816506abusebot-3.cloudsearch.cf sshd[21770]: Failed password for root from 112.85.42.181 port 27739 ssh2
2020-05-14T22:30:45.913153abusebot-3.cloudsearch.cf sshd[21770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-05-15 06:45:31
122.51.241.109 attackbots
Invalid user cloud from 122.51.241.109 port 53642
2020-05-15 06:30:14
52.11.29.75 attackbotsspam
52.11.29.75 - - [21/Feb/2020:15:58:42 +0100] "GET /wp-login.php HTTP/1.1" 404 470
...
2020-05-15 06:40:15
92.63.194.108 attackbotsspam
Invalid user guest from 92.63.194.108 port 34843
2020-05-15 06:29:23
222.186.31.83 attackspambots
05/14/2020-18:21:08.271420 222.186.31.83 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-15 06:21:40
92.246.243.163 attackspambots
2020-05-14T22:14:03.960581shield sshd\[4824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.246.243.163  user=root
2020-05-14T22:14:06.281582shield sshd\[4824\]: Failed password for root from 92.246.243.163 port 60844 ssh2
2020-05-14T22:21:18.962432shield sshd\[7916\]: Invalid user comune from 92.246.243.163 port 42152
2020-05-14T22:21:18.966599shield sshd\[7916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.246.243.163
2020-05-14T22:21:21.006180shield sshd\[7916\]: Failed password for invalid user comune from 92.246.243.163 port 42152 ssh2
2020-05-15 06:35:41

Recently Reported IPs

253.136.175.156 176.63.31.87 245.194.59.31 26.132.249.165
136.227.223.129 121.244.232.149 116.65.251.23 35.125.207.230
23.87.253.63 139.91.187.0 208.42.74.215 132.102.10.83
142.196.7.151 87.144.14.7 170.218.202.138 54.210.75.40
4.178.77.147 67.161.228.105 156.214.26.228 37.154.170.20