Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nanjing

Region: Jiangsu

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.132.125.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57878
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.132.125.132.		IN	A

;; AUTHORITY SECTION:
.			401	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031701 1800 900 604800 86400

;; Query time: 249 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 08:26:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
132.125.132.112.in-addr.arpa domain name pointer 132.125.132.112.adsl-pool.ah.cnuninet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.125.132.112.in-addr.arpa	name = 132.125.132.112.adsl-pool.ah.cnuninet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.165.84 attack
Scan port
2023-09-29 13:10:21
35.175.103.83 attack
Scan port
2023-09-25 17:35:44
222.252.4.247 spambotsattackproxynormal
log
2023-09-22 01:24:59
92.63.196.97 attackproxy
Scan port
2023-09-28 12:38:47
196.200.184.22 spambotsattackproxynormal
196.200.184.219
196.200.184.107
196.200.184.52
196.200.184.191
196.200.184.22
196.200.184.90
196.200.184.194
196.200.184.12
196.200.184.17
196.200.184.177
196.200.184.134
196.200.184.38
196.200.184.229
196.200.184.250
196.200.184.225
196.200.184.142
196.200.184.139
196.200.184.163
196.200.184.186
196.200.184.132
196.200.184.69
196.200.184.153
196.200.184.151
196.200.184.130
196.200.184.196
196.200.184.92
196.200.184.19
196.200.184.64
196.200.184.154
196.200.184.193
196.200.184.108
196.200.184.42
196.200.184.32
196.200.184.128
196.200.184.83
196.200.184.26
196.200.184.99
196.200.184.31
196.200.184.156
196.200.184.215
196.200.184.70
196.200.184.198
196.200.184.165
196.200.184.5
196.200.184.30
196.200.184.66
196.200.184.46
196.200.184.78
196.200.184.124
196.200.184.158
196.200.184.58
196.200.184.244
196.200.184.121
196.200.184.93
196.200.184.119
196.200.184.136
196.200.184.61
196.200.184.245
196.200.184.126
196.200.184.27
196.200.184.129
196.200.184.79
196.200.184.54
196.200.184.173
196.200.184.236
196.200.184.72
196.200.184.187
196.200.184.197
196.200.184.51
196.200.184.36
196.200.184.155
196.200.184.238
196.200.184.176
196.200.184.63
196.200.184.246
196.200.184.141
196.200.184.152
196.200.184.164
196.200.184.125
196.200.184.111
196.200.184.122
196.200.184.148
196.200.184.3
196.200.184.24
2023-09-20 05:50:46
89.248.165.30 attack
Scan port
2023-09-29 13:04:31
173.212.229.197 attack
Scan port
2023-09-27 13:01:40
92.63.196.54 botsattack
Scan port
2023-10-04 12:53:58
104.152.52.102 attack
Scan port
2023-09-27 12:56:17
163.171.180.242 attack
Scan port
2023-09-13 21:31:11
34.120.208.123 attack
Scan port
2023-09-18 19:06:04
89.248.165.88 botsattackproxy
Scan port
2023-09-21 12:37:37
14.128.0.26 attack
Scan port
2023-09-14 18:37:04
222.243.150.47 attack
This ip is using Brute force to try to access our server with RDP
2023-09-20 00:08:40
128.201.76.238 spambotsattackproxynormal
Mandn
2023-09-14 07:24:23

Recently Reported IPs

112.132.125.106 112.132.125.149 112.132.125.158 112.132.125.187
112.132.125.224 112.132.125.248 112.134.142.192 112.162.13.114
112.194.66.147 112.194.66.148 112.194.66.182 112.194.66.188
112.194.66.251 112.196.16.54 112.196.31.218 112.2.112.50
112.2.168.93 112.2.22.83 112.2.227.142 112.2.230.227