Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.80.206.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7701
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.80.206.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 16 20:01:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
136.206.80.40.in-addr.arpa domain name pointer azpdsg7vizfs.stretchoid.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.206.80.40.in-addr.arpa	name = azpdsg7vizfs.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.254.51.182 attackspambots
Mar 10 09:36:06 takio sshd[18037]: Invalid user novogrow from 51.254.51.182 port 49252
Mar 10 09:43:06 takio sshd[18153]: Invalid user novogrow from 51.254.51.182 port 37810
Mar 10 09:46:34 takio sshd[18200]: Invalid user novogrow from 51.254.51.182 port 60814
2020-03-10 16:14:43
116.97.73.81 attackbotsspam
1583812267 - 03/10/2020 04:51:07 Host: 116.97.73.81/116.97.73.81 Port: 445 TCP Blocked
2020-03-10 15:58:29
45.80.65.1 attack
Mar 10 00:36:23 server sshd\[23022\]: Failed password for invalid user tanxjian from 45.80.65.1 port 34586 ssh2
Mar 10 06:42:46 server sshd\[2276\]: Invalid user openfiler from 45.80.65.1
Mar 10 06:42:46 server sshd\[2276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
Mar 10 06:42:49 server sshd\[2276\]: Failed password for invalid user openfiler from 45.80.65.1 port 48380 ssh2
Mar 10 06:51:02 server sshd\[3935\]: Invalid user xguest from 45.80.65.1
Mar 10 06:51:02 server sshd\[3935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.1 
...
2020-03-10 16:04:06
175.24.107.201 attackspam
Mar 10 08:56:38 ArkNodeAT sshd\[29937\]: Invalid user work from 175.24.107.201
Mar 10 08:56:38 ArkNodeAT sshd\[29937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.107.201
Mar 10 08:56:40 ArkNodeAT sshd\[29937\]: Failed password for invalid user work from 175.24.107.201 port 40182 ssh2
2020-03-10 16:31:38
182.228.138.170 attack
Email rejected due to spam filtering
2020-03-10 16:12:10
63.82.48.105 attackspam
Mar 10 04:30:01 mail.srvfarm.net postfix/smtpd[332670]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:12 mail.srvfarm.net postfix/smtpd[332213]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:41 mail.srvfarm.net postfix/smtpd[332665]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 10 04:32:41 mail.srvfarm.net postfix/smtpd[332771]: NOQUEUE: reject: RCPT from unknown[63.82.48.105]: 450 4.1.8 : Sender address r
2020-03-10 15:53:57
51.68.70.175 attack
fail2ban
2020-03-10 16:40:05
188.226.243.10 attackspam
Mar 10 02:42:25 lanister sshd[363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.243.10  user=root
Mar 10 02:42:28 lanister sshd[363]: Failed password for root from 188.226.243.10 port 32848 ssh2
Mar 10 02:48:06 lanister sshd[438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.243.10  user=root
Mar 10 02:48:08 lanister sshd[438]: Failed password for root from 188.226.243.10 port 33082 ssh2
2020-03-10 16:32:36
197.216.14.223 attackspambots
Email rejected due to spam filtering
2020-03-10 16:17:13
190.99.43.164 attackbots
Email rejected due to spam filtering
2020-03-10 16:34:23
185.137.234.155 attack
Mar 10 09:07:08 debian-2gb-nbg1-2 kernel: \[6086777.065168\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.137.234.155 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=51851 PROTO=TCP SPT=40707 DPT=2011 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-10 16:09:37
196.52.43.112 attackbots
port scan and connect, tcp 22 (ssh)
2020-03-10 16:07:19
13.79.184.116 attackbotsspam
Mar 10 08:47:35 mail.srvfarm.net postfix/smtps/smtpd[416782]: warning: unknown[13.79.184.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 08:47:40 mail.srvfarm.net postfix/smtps/smtpd[419751]: warning: unknown[13.79.184.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 08:47:48 mail.srvfarm.net postfix/smtps/smtpd[419741]: warning: unknown[13.79.184.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 08:47:48 mail.srvfarm.net postfix/smtps/smtpd[414654]: warning: unknown[13.79.184.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 08:47:48 mail.srvfarm.net postfix/smtps/smtpd[417000]: warning: unknown[13.79.184.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-10 15:56:47
209.58.157.95 attackbots
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - drstopa.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across drstopa.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re literally looking over your site.

CLI
2020-03-10 16:06:51
111.231.63.208 attackbots
Mar  9 22:12:50 web1 sshd\[10040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.208  user=root
Mar  9 22:12:53 web1 sshd\[10040\]: Failed password for root from 111.231.63.208 port 33346 ssh2
Mar  9 22:17:04 web1 sshd\[10445\]: Invalid user git from 111.231.63.208
Mar  9 22:17:04 web1 sshd\[10445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.208
Mar  9 22:17:06 web1 sshd\[10445\]: Failed password for invalid user git from 111.231.63.208 port 52524 ssh2
2020-03-10 16:27:55

Recently Reported IPs

44.203.190.115 39.96.180.170 165.22.110.172 128.199.234.170
20.64.105.41 14.213.31.163 42.100.253.5 125.122.33.108
117.203.156.136 2409:8918:40d4:6b81:896f:e92c:548a:148d 101.226.9.213 101.226.9.196
111.85.60.219 111.0.237.165 111.0.237.184 38.179.85.208
20.38.37.44 167.172.83.46 154.84.184.122 150.109.46.88