Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.20.130.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.20.130.162.			IN	A

;; AUTHORITY SECTION:
.			511	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020400 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 04 21:39:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 162.130.20.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.130.20.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.91.176.157 attackbotsspam
Unauthorized connection attempt from IP address 80.91.176.157 on Port 445(SMB)
2020-06-17 04:16:54
195.74.72.42 attackspambots
Unauthorized connection attempt from IP address 195.74.72.42 on Port 445(SMB)
2020-06-17 04:17:08
110.136.0.59 attackbotsspam
1592316128 - 06/16/2020 16:02:08 Host: 110.136.0.59/110.136.0.59 Port: 445 TCP Blocked
2020-06-17 04:11:57
193.93.12.162 attack
Unauthorized connection attempt from IP address 193.93.12.162 on Port 445(SMB)
2020-06-17 04:14:34
96.3.183.213 attackspam
Brute forcing email accounts
2020-06-17 04:03:07
194.156.105.5 attackspambots
Contact form spam
2020-06-17 04:09:37
61.216.2.79 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 59 - port: 7112 proto: TCP cat: Misc Attack
2020-06-17 04:27:03
198.245.51.185 attackspam
IP blocked
2020-06-17 04:08:28
189.124.8.7 attack
SSH bruteforce
2020-06-17 04:00:32
103.146.110.22 attack
DATE:2020-06-16 14:15:58, IP:103.146.110.22, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-06-17 04:04:41
196.36.1.108 attackbotsspam
Unauthorized SSH login attempts
2020-06-17 04:02:09
27.150.22.44 attack
Jun 16 16:06:01 pkdns2 sshd\[41203\]: Invalid user a4 from 27.150.22.44Jun 16 16:06:02 pkdns2 sshd\[41203\]: Failed password for invalid user a4 from 27.150.22.44 port 32910 ssh2Jun 16 16:08:13 pkdns2 sshd\[41332\]: Invalid user user from 27.150.22.44Jun 16 16:08:16 pkdns2 sshd\[41332\]: Failed password for invalid user user from 27.150.22.44 port 56672 ssh2Jun 16 16:10:22 pkdns2 sshd\[41484\]: Failed password for root from 27.150.22.44 port 52196 ssh2Jun 16 16:12:16 pkdns2 sshd\[41568\]: Invalid user cs from 27.150.22.44
...
2020-06-17 04:30:57
201.243.245.43 attackspambots
Unauthorized connection attempt from IP address 201.243.245.43 on Port 445(SMB)
2020-06-17 04:19:53
42.118.5.203 attackspambots
Unauthorized connection attempt from IP address 42.118.5.203 on Port 445(SMB)
2020-06-17 03:56:48
54.39.23.55 attackbots
xmlrpc attack
2020-06-17 03:58:44

Recently Reported IPs

244.215.140.237 230.69.145.215 51.79.93.82 230.79.139.237
249.212.16.39 145.107.2.253 88.92.226.223 253.102.79.0
218.227.211.163 82.124.198.20 123.180.153.159 209.30.95.4
10.136.56.61 97.5.154.125 251.16.55.126 49.145.225.222
158.47.46.174 62.195.28.170 92.130.86.203 200.141.146.189