Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.52.49.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53532
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.52.49.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:08:16 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 136.49.52.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.49.52.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.83.180.76 attackspambots
sshd: Failed password for .... from 118.83.180.76 port 34382 ssh2
2020-09-10 21:54:00
217.182.193.13 attackspam
 TCP (SYN) 217.182.193.13:58056 -> port 2345, len 44
2020-09-10 21:20:10
49.233.32.245 attackbotsspam
Bruteforce detected by fail2ban
2020-09-10 22:00:39
141.98.80.22 attack
scans 10 times in preceeding hours on the ports (in chronological order) 11309 20387 29890 33389 33390 33391 34098 39345 41765 54712
2020-09-10 21:55:19
240e:390:1040:264b:243:5d17:f500:194f attackbots
Unauthorized imap request
2020-09-10 21:24:18
199.36.221.115 attack
[2020-09-09 19:02:50] NOTICE[1239][C-000006fc] chan_sip.c: Call from '' (199.36.221.115:54591) to extension '99999999999999011972595725668' rejected because extension not found in context 'public'.
[2020-09-09 19:02:50] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-09T19:02:50.851-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="99999999999999011972595725668",SessionID="0x7f4d4804ac88",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/199.36.221.115/54591",ACLName="no_extension_match"
[2020-09-09 19:05:46] NOTICE[1239][C-00000701] chan_sip.c: Call from '' (199.36.221.115:58077) to extension '999999999999999011972595725668' rejected because extension not found in context 'public'.
[2020-09-09 19:05:46] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-09T19:05:46.782-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="999999999999999011972595725668",SessionID="0x7f4d4804ac88",LocalA
...
2020-09-10 21:30:51
222.186.169.194 attack
Sep 10 13:52:11 instance-2 sshd[14814]: Failed password for root from 222.186.169.194 port 27930 ssh2
Sep 10 13:52:16 instance-2 sshd[14814]: Failed password for root from 222.186.169.194 port 27930 ssh2
Sep 10 13:52:19 instance-2 sshd[14814]: Failed password for root from 222.186.169.194 port 27930 ssh2
Sep 10 13:52:24 instance-2 sshd[14814]: Failed password for root from 222.186.169.194 port 27930 ssh2
2020-09-10 21:53:15
84.243.21.114 attackbots
Sep  9 12:57:29 aragorn sshd[16333]: Invalid user admin from 84.243.21.114
Sep  9 12:57:30 aragorn sshd[16335]: Invalid user admin from 84.243.21.114
Sep  9 12:57:33 aragorn sshd[16337]: Invalid user admin from 84.243.21.114
Sep  9 12:57:34 aragorn sshd[16339]: Invalid user admin from 84.243.21.114
...
2020-09-10 21:22:35
113.105.80.34 attackspambots
Failed password for invalid user buser from 113.105.80.34 port 54068 ssh2
2020-09-10 21:19:09
112.85.42.181 attackspambots
Sep 10 15:41:50 host sshd[16450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Sep 10 15:41:52 host sshd[16450]: Failed password for root from 112.85.42.181 port 60674 ssh2
...
2020-09-10 21:45:44
218.237.253.167 attackspam
Sep 10 10:53:58 ns382633 sshd\[26226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.253.167  user=root
Sep 10 10:54:00 ns382633 sshd\[26226\]: Failed password for root from 218.237.253.167 port 33461 ssh2
Sep 10 10:59:07 ns382633 sshd\[27133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.253.167  user=root
Sep 10 10:59:09 ns382633 sshd\[27133\]: Failed password for root from 218.237.253.167 port 34685 ssh2
Sep 10 11:00:59 ns382633 sshd\[27676\]: Invalid user deploy from 218.237.253.167 port 47016
Sep 10 11:00:59 ns382633 sshd\[27676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.253.167
2020-09-10 22:02:25
222.186.175.216 attack
Sep 10 15:25:49 server sshd[31142]: Failed none for root from 222.186.175.216 port 37764 ssh2
Sep 10 15:25:52 server sshd[31142]: Failed password for root from 222.186.175.216 port 37764 ssh2
Sep 10 15:26:08 server sshd[31211]: Failed password for root from 222.186.175.216 port 45500 ssh2
2020-09-10 21:34:58
172.58.14.193 attackbots
This phone, on a T-Mobil network in Miami, logged into my snapchat account. Snapchat alerted me giving me the location and IP address of the device used and I was able to reset my PW.
2020-09-10 22:01:03
112.85.42.180 attackspam
Sep 10 03:55:31 web1 sshd\[29112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
Sep 10 03:55:33 web1 sshd\[29112\]: Failed password for root from 112.85.42.180 port 58087 ssh2
Sep 10 03:55:37 web1 sshd\[29112\]: Failed password for root from 112.85.42.180 port 58087 ssh2
Sep 10 03:55:40 web1 sshd\[29112\]: Failed password for root from 112.85.42.180 port 58087 ssh2
Sep 10 03:55:44 web1 sshd\[29112\]: Failed password for root from 112.85.42.180 port 58087 ssh2
2020-09-10 21:59:08
210.195.154.144 attackbotsspam
 TCP (SYN) 210.195.154.144:10574 -> port 8080, len 44
2020-09-10 21:18:22

Recently Reported IPs

187.121.136.255 30.205.46.217 209.137.187.149 119.84.63.196
145.213.151.159 121.188.193.166 58.228.72.130 38.6.31.78
64.235.187.242 214.51.34.113 132.241.33.130 235.176.55.18
21.18.219.241 56.227.251.164 115.188.11.68 236.62.41.4
199.76.28.21 89.122.121.186 47.13.8.2 135.5.244.33