Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kirchdorf an der Krems

Region: Upper Austria

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.119.40.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.119.40.40.			IN	A

;; AUTHORITY SECTION:
.			212	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122500 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 26 02:48:37 CST 2021
;; MSG SIZE  rcvd: 105
Host info
40.40.119.91.in-addr.arpa domain name pointer 91-119-40-40.dsl.dynamic.surfer.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.40.119.91.in-addr.arpa	name = 91-119-40-40.dsl.dynamic.surfer.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.77.212 attackbots
Multiport scan : 4 ports scanned 111 443(x2) 1433 1604
2020-02-25 06:35:09
103.224.216.215 attack
1582550254 - 02/24/2020 14:17:34 Host: 103.224.216.215/103.224.216.215 Port: 445 TCP Blocked
2020-02-25 06:15:47
190.96.238.229 attack
Port probing on unauthorized port 23
2020-02-25 06:15:26
141.136.83.189 attack
Unauthorized connection attempt from IP address 141.136.83.189 on Port 445(SMB)
2020-02-25 06:41:07
185.244.39.76 attack
02/24/2020-23:05:02.115054 185.244.39.76 Protocol: 17 ET SCAN Sipvicious Scan
2020-02-25 06:22:52
212.83.145.72 attack
Unauthorized IMAP connection attempt
2020-02-25 06:22:30
115.159.107.118 attack
PHP Info File Request - Possible PHP Version Scan
2020-02-25 06:10:47
114.32.52.184 attackspambots
Automatic report - XMLRPC Attack
2020-02-25 06:08:54
37.189.144.10 attackbots
Automatic report - Port Scan Attack
2020-02-25 06:32:22
49.212.211.207 attackbotsspam
$f2bV_matches
2020-02-25 06:03:05
61.222.131.61 attack
$f2bV_matches
2020-02-25 06:23:07
191.54.61.248 attackspam
Unauthorized connection attempt from IP address 191.54.61.248 on Port 445(SMB)
2020-02-25 06:04:01
49.145.231.110 attack
Unauthorized connection attempt from IP address 49.145.231.110 on Port 445(SMB)
2020-02-25 06:00:33
109.165.11.163 attackbots
Feb 24 14:17:01 debian-2gb-nbg1-2 kernel: \[4809421.746737\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=109.165.11.163 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=53 ID=14528 DF PROTO=TCP SPT=49645 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-02-25 06:33:18
194.190.93.136 attackspambots
proto=tcp  .  spt=47051  .  dpt=25  .     Listed on    MailSpike (spam wave plus L3-L5) also unsubscore and rbldns-ru     (211)
2020-02-25 06:20:13

Recently Reported IPs

177.236.242.92 177.101.241.146 72.159.47.219 251.130.83.131
194.94.188.139 17.34.4.17 103.235.4.133 134.8.245.31
208.44.200.85 114.69.85.24 169.52.11.191 2.11.66.242
140.202.136.105 90.0.137.6 219.93.220.7 242.148.167.215
20.46.53.2 155.139.65.237 80.138.85.100 221.195.39.253