Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.193.127.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18190
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;40.193.127.138.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082100 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 21 15:09:52 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 138.127.193.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 138.127.193.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.82.64.73 attack
Port-scan: detected 211 distinct ports within a 24-hour window.
2019-11-08 05:50:42
45.80.64.127 attackspambots
2019-11-07 16:09:12,426 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 45.80.64.127
2019-11-07 16:41:36,058 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 45.80.64.127
2019-11-07 17:12:55,493 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 45.80.64.127
2019-11-07 17:45:01,412 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 45.80.64.127
2019-11-07 18:20:38,826 fail2ban.actions        \[14488\]: NOTICE  \[sshd\] Ban 45.80.64.127
...
2019-11-08 06:03:47
60.28.24.184 attack
firewall-block, port(s): 1433/tcp
2019-11-08 05:36:22
185.176.27.162 attackbots
Multiport scan : 45 ports scanned 52 89 125 338 1090 1351 1991 2012 2018 2021 2030 2033 2255 3012 3306 3331 3358 3386 3388 3402 3590 4489 5252 5389 5557 6060 6523 7100 7789 8112 8389 8393 8800 8989 8999 9090 9100 32289 33000 33089 33892 44389 50000 60389 65254
2019-11-08 05:27:25
91.222.19.225 attackspam
Nov  7 23:03:19 *** sshd[30722]: Failed password for invalid user insserver from 91.222.19.225 port 46620 ssh2
Nov  7 23:07:02 *** sshd[30806]: Failed password for invalid user oracle from 91.222.19.225 port 55836 ssh2
Nov  7 23:10:37 *** sshd[30895]: Failed password for invalid user marie from 91.222.19.225 port 36814 ssh2
Nov  7 23:29:36 *** sshd[31159]: Failed password for invalid user morfeu from 91.222.19.225 port 54576 ssh2
Nov  7 23:33:22 *** sshd[31195]: Failed password for invalid user dsetiadi from 91.222.19.225 port 35562 ssh2
Nov  7 23:37:12 *** sshd[31236]: Failed password for invalid user jan from 91.222.19.225 port 44778 ssh2
Nov  7 23:41:01 *** sshd[31358]: Failed password for invalid user internatsschule from 91.222.19.225 port 53994 ssh2
Nov  7 23:44:51 *** sshd[31439]: Failed password for invalid user student03 from 91.222.19.225 port 34974 ssh2
Nov  7 23:52:42 *** sshd[31526]: Failed password for invalid user ou from 91.222.19.225 port 53396 ssh2
Nov  8 00:00:02 *** sshd[31598]: Failed pas
2019-11-08 05:47:40
61.8.69.98 attackspam
Failed password for root from 61.8.69.98 port 50160 ssh2
2019-11-08 05:49:03
2.34.35.105 attackspambots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/2.34.35.105/ 
 
 IT - 1H : (110)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN30722 
 
 IP : 2.34.35.105 
 
 CIDR : 2.34.0.0/16 
 
 PREFIX COUNT : 323 
 
 UNIQUE IP COUNT : 5230848 
 
 
 ATTACKS DETECTED ASN30722 :  
  1H - 2 
  3H - 2 
  6H - 4 
 12H - 4 
 24H - 10 
 
 DateTime : 2019-11-07 15:39:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-08 05:45:55
122.4.241.6 attack
Nov  7 22:12:34 MK-Soft-Root2 sshd[16224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.4.241.6 
Nov  7 22:12:35 MK-Soft-Root2 sshd[16224]: Failed password for invalid user ryley from 122.4.241.6 port 21511 ssh2
...
2019-11-08 05:40:47
123.207.90.4 attack
Nov  7 18:42:18 marvibiene sshd[65151]: Invalid user p@ssw0rd1234 from 123.207.90.4 port 47384
Nov  7 18:42:18 marvibiene sshd[65151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.90.4
Nov  7 18:42:18 marvibiene sshd[65151]: Invalid user p@ssw0rd1234 from 123.207.90.4 port 47384
Nov  7 18:42:20 marvibiene sshd[65151]: Failed password for invalid user p@ssw0rd1234 from 123.207.90.4 port 47384 ssh2
...
2019-11-08 05:57:01
220.121.97.43 attackspambots
TCP 3389 (RDP)
2019-11-08 05:31:29
51.254.206.149 attack
Nov  7 16:20:39 SilenceServices sshd[25873]: Failed password for root from 51.254.206.149 port 60116 ssh2
Nov  7 16:24:14 SilenceServices sshd[27520]: Failed password for root from 51.254.206.149 port 40748 ssh2
2019-11-08 05:41:15
197.243.34.154 attackbots
Nov  7 21:59:06 MK-Soft-VM4 sshd[11816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.243.34.154 
Nov  7 21:59:08 MK-Soft-VM4 sshd[11816]: Failed password for invalid user server from 197.243.34.154 port 41028 ssh2
...
2019-11-08 05:55:11
5.140.43.38 attackspam
Chat Spam
2019-11-08 05:32:16
40.115.181.216 attackbots
2019-11-07T22:18:57.124456mail01 postfix/smtpd[27106]: warning: unknown[40.115.181.216]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T22:21:25.084712mail01 postfix/smtpd[30684]: warning: unknown[40.115.181.216]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T22:21:25.085153mail01 postfix/smtpd[27019]: warning: unknown[40.115.181.216]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 05:31:17
2a01:7a7:2:1bbf:225:90ff:fee1:d4e0 attackbots
C2,WP GET /wp-login.php
2019-11-08 05:56:18

Recently Reported IPs

113.105.186.231 211.221.147.49 196.171.197.181 105.192.133.18
222.15.232.96 193.32.160.144 79.187.22.70 182.221.0.3
93.194.133.166 45.251.58.62 30.197.192.135 193.32.160.143
122.62.125.99 179.123.239.197 179.51.148.232 209.235.133.183
176.61.233.2 63.215.58.27 193.32.160.142 212.149.239.89