Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.198.52.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.198.52.245.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:14:52 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 245.52.198.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.52.198.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.15.89.211 attackbotsspam
Honeypot attack, port: 445, PTR: 187-15-89-211.user.veloxzone.com.br.
2020-03-13 23:16:29
180.166.240.99 attackbots
Mar 13 15:39:31 localhost sshd\[8378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.240.99  user=root
Mar 13 15:39:33 localhost sshd\[8378\]: Failed password for root from 180.166.240.99 port 36328 ssh2
Mar 13 15:41:07 localhost sshd\[8507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.166.240.99  user=root
2020-03-13 22:49:05
82.209.191.216 attackbotsspam
Honeypot attack, port: 5555, PTR: 82-209-191-216.cust.bredband2.com.
2020-03-13 22:48:48
92.63.194.104 attackbots
Unauthorized connection attempt detected from IP address 92.63.194.104 to port 22 [T]
2020-03-13 22:51:28
49.233.134.252 attackbots
Mar 13 10:16:54 plusreed sshd[6307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.134.252  user=root
Mar 13 10:16:56 plusreed sshd[6307]: Failed password for root from 49.233.134.252 port 47814 ssh2
...
2020-03-13 23:19:06
183.134.104.146 attackbots
MH/MP Probe, Scan, Hack -
2020-03-13 22:44:42
151.16.33.127 attack
Jan 27 17:15:51 pi sshd[8121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.16.33.127 
Jan 27 17:15:53 pi sshd[8121]: Failed password for invalid user enigma from 151.16.33.127 port 48140 ssh2
2020-03-13 22:47:22
176.109.20.207 attackspambots
" "
2020-03-13 22:47:01
150.223.27.22 attack
Feb  3 00:20:40 pi sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.27.22 
Feb  3 00:20:42 pi sshd[30749]: Failed password for invalid user farmer from 150.223.27.22 port 33303 ssh2
2020-03-13 23:02:59
106.12.155.162 attack
Mar 13 10:11:42 vps46666688 sshd[17966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.155.162
Mar 13 10:11:44 vps46666688 sshd[17966]: Failed password for invalid user redhat from 106.12.155.162 port 52932 ssh2
...
2020-03-13 22:45:46
200.90.190.68 attackbotsspam
Unauthorized connection attempt detected from IP address 200.90.190.68 to port 22
2020-03-13 23:20:17
94.202.61.191 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-13 23:19:51
79.36.66.32 attackspam
Honeypot attack, port: 5555, PTR: host32-66-dynamic.36-79-r.retail.telecomitalia.it.
2020-03-13 22:42:50
150.242.74.186 attackbotsspam
Feb 12 23:54:34 pi sshd[17916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.242.74.186  user=www-data
Feb 12 23:54:36 pi sshd[17916]: Failed password for invalid user www-data from 150.242.74.186 port 58754 ssh2
2020-03-13 22:58:39
178.128.7.249 attackspam
Feb  8 19:16:43 pi sshd[4306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.7.249 
Feb  8 19:16:45 pi sshd[4306]: Failed password for invalid user uoy from 178.128.7.249 port 37022 ssh2
2020-03-13 23:07:06

Recently Reported IPs

147.67.178.176 130.70.152.251 248.43.126.112 156.235.80.34
29.33.181.112 45.181.220.221 67.184.238.101 254.189.162.117
90.100.54.44 49.240.63.81 66.116.198.37 196.199.64.34
95.192.53.171 24.114.40.63 150.65.153.241 165.51.55.211
215.226.212.106 34.4.146.42 28.127.147.111 178.62.238.197