Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Innsbruck

Region: Tirol

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.109.136.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21211
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.109.136.40.			IN	A

;; AUTHORITY SECTION:
.			390	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122901 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 30 08:51:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
40.136.109.80.in-addr.arpa domain name pointer 80-109-136-40.cable.dynamic.surfer.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.136.109.80.in-addr.arpa	name = 80-109-136-40.cable.dynamic.surfer.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.70 attack
2020-06-05T16:18:17.431828shield sshd\[13307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-06-05T16:18:19.720882shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:18:22.170436shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:18:24.364132shield sshd\[13307\]: Failed password for root from 49.88.112.70 port 20737 ssh2
2020-06-05T16:25:43.286689shield sshd\[13949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.70  user=root
2020-06-06 00:39:21
222.186.31.166 attackspam
Jun  5 18:09:44 * sshd[14590]: Failed password for root from 222.186.31.166 port 61077 ssh2
2020-06-06 00:16:58
125.22.9.186 attackbotsspam
Jun  5 16:04:24 vps687878 sshd\[17486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186  user=root
Jun  5 16:04:26 vps687878 sshd\[17486\]: Failed password for root from 125.22.9.186 port 38721 ssh2
Jun  5 16:07:38 vps687878 sshd\[17879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186  user=root
Jun  5 16:07:39 vps687878 sshd\[17879\]: Failed password for root from 125.22.9.186 port 34000 ssh2
Jun  5 16:11:02 vps687878 sshd\[18389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.9.186  user=root
...
2020-06-06 00:33:56
190.14.247.226 attackbotsspam
Unauthorized connection attempt from IP address 190.14.247.226 on Port 445(SMB)
2020-06-06 00:21:45
164.132.73.220 attack
2020-06-05T18:06:42.738724rocketchat.forhosting.nl sshd[8774]: Failed password for root from 164.132.73.220 port 41306 ssh2
2020-06-05T18:09:46.750004rocketchat.forhosting.nl sshd[8791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.73.220  user=root
2020-06-05T18:09:49.221735rocketchat.forhosting.nl sshd[8791]: Failed password for root from 164.132.73.220 port 42088 ssh2
...
2020-06-06 00:25:36
164.132.98.229 attackbotsspam
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:48 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:49 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.98.229 - - [05/Jun/2020:13:59:49 +0200] "POST /wp-login.php HTTP/1.1" 200 2009 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-06-06 00:38:06
124.158.7.220 attackspam
scan r
2020-06-06 00:46:04
202.149.222.94 attackbots
Unauthorized connection attempt from IP address 202.149.222.94 on Port 445(SMB)
2020-06-06 00:12:40
92.52.207.64 attackspam
Distributed brute force attack
2020-06-06 00:35:23
222.186.175.215 attackspambots
Jun  5 18:44:22 santamaria sshd\[906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Jun  5 18:44:25 santamaria sshd\[906\]: Failed password for root from 222.186.175.215 port 22576 ssh2
Jun  5 18:44:29 santamaria sshd\[906\]: Failed password for root from 222.186.175.215 port 22576 ssh2
...
2020-06-06 00:51:00
193.191.179.224 attackspambots
Jun  5 15:29:58 odroid64 sshd\[19136\]: User root from 193.191.179.224 not allowed because not listed in AllowUsers
Jun  5 15:29:58 odroid64 sshd\[19136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.191.179.224  user=root
...
2020-06-06 00:15:07
93.157.62.102 attackbots
2020-06-05T19:18:56.247285afi-git.jinr.ru sshd[2405]: Invalid user ansible from 93.157.62.102 port 56930
2020-06-05T19:18:56.250528afi-git.jinr.ru sshd[2405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.157.62.102
2020-06-05T19:18:56.247285afi-git.jinr.ru sshd[2405]: Invalid user ansible from 93.157.62.102 port 56930
2020-06-05T19:18:58.230167afi-git.jinr.ru sshd[2405]: Failed password for invalid user ansible from 93.157.62.102 port 56930 ssh2
2020-06-05T19:19:04.092728afi-git.jinr.ru sshd[2482]: Invalid user centos from 93.157.62.102 port 38474
...
2020-06-06 00:32:42
98.110.243.204 attack
detected by Fail2Ban
2020-06-06 00:22:44
125.137.191.215 attackspam
Jun  5 17:10:35 ift sshd\[29072\]: Failed password for root from 125.137.191.215 port 51286 ssh2Jun  5 17:12:47 ift sshd\[29193\]: Failed password for root from 125.137.191.215 port 53492 ssh2Jun  5 17:14:58 ift sshd\[29366\]: Failed password for root from 125.137.191.215 port 55696 ssh2Jun  5 17:17:18 ift sshd\[29760\]: Failed password for root from 125.137.191.215 port 57902 ssh2Jun  5 17:19:33 ift sshd\[29924\]: Failed password for root from 125.137.191.215 port 60108 ssh2
...
2020-06-06 00:32:56
111.231.208.104 attackbots
Jun  5 05:33:58 mockhub sshd[19816]: Failed password for root from 111.231.208.104 port 57460 ssh2
...
2020-06-06 00:46:39

Recently Reported IPs

140.61.51.122 87.198.227.47 92.214.158.234 60.159.11.231
32.174.113.65 248.243.47.149 216.207.103.139 205.74.120.115
244.18.118.96 86.85.208.47 178.77.0.154 141.98.83.164
14.66.222.10 144.116.139.158 106.225.83.7 11.82.15.30
166.117.181.165 155.136.141.140 216.174.111.182 67.5.38.133