Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.45.35.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18243
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.45.35.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070500 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 05 16:46:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 149.35.45.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
server can't find 40.45.35.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.53.116.251 attack
19/12/28@17:37:44: FAIL: Alarm-Telnet address from=1.53.116.251
...
2019-12-29 07:08:00
218.92.0.172 attackbots
Dec 28 23:37:58 [host] sshd[25769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Dec 28 23:38:01 [host] sshd[25769]: Failed password for root from 218.92.0.172 port 8474 ssh2
Dec 28 23:38:23 [host] sshd[25812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
2019-12-29 06:41:19
149.129.58.243 attackbots
Automatic report - Banned IP Access
2019-12-29 07:10:20
122.51.46.172 attackspambots
Dec 28 23:37:57 localhost sshd\[4077\]: Invalid user stage from 122.51.46.172 port 40770
Dec 28 23:37:57 localhost sshd\[4077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.46.172
Dec 28 23:38:00 localhost sshd\[4077\]: Failed password for invalid user stage from 122.51.46.172 port 40770 ssh2
2019-12-29 06:54:33
106.12.99.173 attackspam
Dec 28 23:38:25 lnxweb61 sshd[20948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.173
Dec 28 23:38:25 lnxweb61 sshd[20948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.99.173
2019-12-29 06:40:03
49.88.112.116 attackspam
Failed password for root from 49.88.112.116 port 61753 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Failed password for root from 49.88.112.116 port 22087 ssh2
Failed password for root from 49.88.112.116 port 22087 ssh2
Failed password for root from 49.88.112.116 port 22087 ssh2
2019-12-29 06:49:06
122.192.255.228 attackbotsspam
Invalid user mezzaroba from 122.192.255.228 port 50944
2019-12-29 07:01:25
184.168.193.59 attackbotsspam
Automatic report - XMLRPC Attack
2019-12-29 07:14:17
47.94.222.66 attackspam
3389BruteforceFW21
2019-12-29 07:12:38
218.92.0.131 attackbots
2019-12-28T23:55:13.289766scmdmz1 sshd[27537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
2019-12-28T23:55:15.335214scmdmz1 sshd[27537]: Failed password for root from 218.92.0.131 port 31438 ssh2
2019-12-28T23:55:18.684850scmdmz1 sshd[27537]: Failed password for root from 218.92.0.131 port 31438 ssh2
2019-12-28T23:55:13.289766scmdmz1 sshd[27537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
2019-12-28T23:55:15.335214scmdmz1 sshd[27537]: Failed password for root from 218.92.0.131 port 31438 ssh2
2019-12-28T23:55:18.684850scmdmz1 sshd[27537]: Failed password for root from 218.92.0.131 port 31438 ssh2
2019-12-28T23:55:13.289766scmdmz1 sshd[27537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
2019-12-28T23:55:15.335214scmdmz1 sshd[27537]: Failed password for root from 218.92.0.131 port 31438 ssh2
2019-12-28T23:55:
2019-12-29 07:11:55
180.232.84.164 attack
Fail2Ban Ban Triggered
2019-12-29 06:39:17
61.244.196.102 attackbots
C1,DEF GET /wp-login.php
2019-12-29 07:02:30
139.217.227.32 attackbots
Automatic report - SSH Brute-Force Attack
2019-12-29 07:17:38
222.186.175.212 attack
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-12-28T23:14:35.536154abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:38.141426abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
2019-12-28T23:14:35.536154abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:38.141426abusebot-2.cloudsearch.cf sshd[18410]: Failed password for root from 222.186.175.212 port 32922 ssh2
2019-12-28T23:14:34.103316abusebot-2.cloudsearch.cf sshd[18410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2019-12-29 07:15:21
35.203.148.246 attackspambots
Dec 28 23:34:36 legacy sshd[25321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
Dec 28 23:34:38 legacy sshd[25321]: Failed password for invalid user natalie123 from 35.203.148.246 port 52736 ssh2
Dec 28 23:38:02 legacy sshd[25390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.203.148.246
...
2019-12-29 06:54:51

Recently Reported IPs

192.168.12.105 172.113.45.57 20.150.181.126 67.233.61.32
28.51.148.36 163.92.221.203 71.36.77.78 20.136.128.115
108.92.196.99 51.2.88.144 72.171.63.92 158.207.147.0
112.206.2.67 77.191.245.197 103.189.35.179 24.19.139.165
59.228.163.68 13.86.105.19 52.232.121.169 220.135.247.117