Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.139.149.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.139.149.0.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010400 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 19:20:12 CST 2022
;; MSG SIZE  rcvd: 105
Host info
0.149.139.40.in-addr.arpa domain name pointer h0.149.139.40.ip.windstream.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
0.149.139.40.in-addr.arpa	name = h0.149.139.40.ip.windstream.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.216.127.86 attackbotsspam
unauthorized connection attempt
2020-01-12 14:26:14
77.75.129.123 attackbotsspam
unauthorized connection attempt
2020-01-12 14:19:16
107.189.10.141 attackspambots
Invalid user fake from 107.189.10.141 port 45516
2020-01-12 14:19:01
128.199.133.201 attack
Unauthorized connection attempt detected from IP address 128.199.133.201 to port 2220 [J]
2020-01-12 15:02:06
187.202.219.79 attack
unauthorized connection attempt
2020-01-12 14:25:41
186.52.233.97 attack
Bruteforce on SSH Honeypot
2020-01-12 14:48:05
46.200.71.82 attackspambots
unauthorized connection attempt
2020-01-12 14:44:36
186.170.28.46 attackbots
2020-01-12T06:40:14.777161shield sshd\[24357\]: Invalid user halo from 186.170.28.46 port 34200
2020-01-12T06:40:14.782284shield sshd\[24357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46
2020-01-12T06:40:16.494474shield sshd\[24357\]: Failed password for invalid user halo from 186.170.28.46 port 34200 ssh2
2020-01-12T06:43:19.379270shield sshd\[24636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46  user=root
2020-01-12T06:43:21.824626shield sshd\[24636\]: Failed password for root from 186.170.28.46 port 46625 ssh2
2020-01-12 14:58:43
138.197.195.52 attackbots
Unauthorized connection attempt detected from IP address 138.197.195.52 to port 2220 [J]
2020-01-12 14:50:30
197.38.106.71 attack
unauthorized connection attempt
2020-01-12 14:22:27
185.212.48.110 attackspambots
1578805011 - 01/12/2020 05:56:51 Host: 185.212.48.110/185.212.48.110 Port: 445 TCP Blocked
2020-01-12 14:55:50
42.118.34.3 attackbots
unauthorized connection attempt
2020-01-12 14:20:26
185.42.195.84 attack
Unauthorized connection attempt detected from IP address 185.42.195.84 to port 23
2020-01-12 14:26:42
175.115.223.201 attackspambots
unauthorized connection attempt
2020-01-12 14:29:00
168.196.94.112 attackbots
unauthorized connection attempt
2020-01-12 14:29:42

Recently Reported IPs

169.237.234.72 10.121.222.180 96.255.1.121 22.109.68.155
196.197.3.9 65.148.127.153 116.112.252.79 76.214.81.2
72.2.184.122 193.187.226.26 84.122.144.243 31.59.109.143
174.40.15.151 143.198.12.157 43.175.171.174 212.186.224.69
212.180.211.23 82.26.221.180 117.99.5.4 100.86.216.19