Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DoD Network Information Center

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.132.61.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56413
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.132.61.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071301 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 03:32:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 42.61.132.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 42.61.132.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.5.193.121 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-22 03:16:31,707 INFO [amun_request_handler] PortScan Detected on Port: 445 (185.5.193.121)
2019-09-22 15:28:09
157.230.144.158 attackspam
Sep 22 07:21:26 venus sshd\[1947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158  user=sshd
Sep 22 07:21:28 venus sshd\[1947\]: Failed password for sshd from 157.230.144.158 port 39852 ssh2
Sep 22 07:25:51 venus sshd\[2056\]: Invalid user oframe2 from 157.230.144.158 port 53158
...
2019-09-22 15:26:37
222.186.173.119 attackspam
Sep 22 09:15:53 cvbnet sshd[31057]: Failed password for root from 222.186.173.119 port 60406 ssh2
Sep 22 09:15:57 cvbnet sshd[31057]: Failed password for root from 222.186.173.119 port 60406 ssh2
2019-09-22 15:17:43
166.111.80.44 attack
$f2bV_matches
2019-09-22 15:42:11
113.164.231.131 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-22 03:17:47,209 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.164.231.131)
2019-09-22 15:24:27
114.33.147.84 attackspambots
Sep 21 21:18:35 eddieflores sshd\[12928\]: Invalid user stan123 from 114.33.147.84
Sep 21 21:18:35 eddieflores sshd\[12928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-33-147-84.hinet-ip.hinet.net
Sep 21 21:18:37 eddieflores sshd\[12928\]: Failed password for invalid user stan123 from 114.33.147.84 port 41652 ssh2
Sep 21 21:23:33 eddieflores sshd\[13386\]: Invalid user 123456 from 114.33.147.84
Sep 21 21:23:33 eddieflores sshd\[13386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114-33-147-84.hinet-ip.hinet.net
2019-09-22 15:25:27
51.254.33.188 attackspam
$f2bV_matches
2019-09-22 15:27:47
182.71.221.78 attackbotsspam
2019-09-22T06:47:47.345657abusebot-2.cloudsearch.cf sshd\[30504\]: Invalid user mcserver from 182.71.221.78 port 38802
2019-09-22 15:07:07
41.33.119.67 attackbotsspam
Invalid user temp from 41.33.119.67 port 32229
2019-09-22 14:57:51
222.186.175.8 attackspambots
Sep 22 09:05:10 cp sshd[6931]: Failed password for root from 222.186.175.8 port 19200 ssh2
Sep 22 09:05:10 cp sshd[6931]: Failed password for root from 222.186.175.8 port 19200 ssh2
Sep 22 09:05:14 cp sshd[6931]: Failed password for root from 222.186.175.8 port 19200 ssh2
2019-09-22 15:13:42
124.251.19.213 attackspam
Sep 22 10:01:44 www sshd\[39606\]: Invalid user winrar from 124.251.19.213
Sep 22 10:01:44 www sshd\[39606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.251.19.213
Sep 22 10:01:46 www sshd\[39606\]: Failed password for invalid user winrar from 124.251.19.213 port 38980 ssh2
...
2019-09-22 15:08:00
45.81.131.193 attackbots
$f2bV_matches
2019-09-22 15:32:57
85.113.210.58 attack
$f2bV_matches
2019-09-22 15:12:24
112.170.78.118 attackbots
Sep 22 07:08:07 site3 sshd\[222234\]: Invalid user help123 from 112.170.78.118
Sep 22 07:08:07 site3 sshd\[222234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
Sep 22 07:08:08 site3 sshd\[222234\]: Failed password for invalid user help123 from 112.170.78.118 port 55558 ssh2
Sep 22 07:13:10 site3 sshd\[222345\]: Invalid user toni123 from 112.170.78.118
Sep 22 07:13:10 site3 sshd\[222345\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.78.118
...
2019-09-22 15:34:00
43.239.176.113 attackbotsspam
Sep 21 21:08:25 friendsofhawaii sshd\[30111\]: Invalid user elasticsearch from 43.239.176.113
Sep 21 21:08:25 friendsofhawaii sshd\[30111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113
Sep 21 21:08:28 friendsofhawaii sshd\[30111\]: Failed password for invalid user elasticsearch from 43.239.176.113 port 45403 ssh2
Sep 21 21:12:46 friendsofhawaii sshd\[30603\]: Invalid user jazmin from 43.239.176.113
Sep 21 21:12:46 friendsofhawaii sshd\[30603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113
2019-09-22 15:17:18

Recently Reported IPs

104.142.235.246 67.37.87.109 54.152.210.242 203.79.46.7
2001:16b8:684c:3800:11f8:8063:a87b:7110 192.3.58.166 87.217.12.68 176.198.118.131
70.198.213.30 138.36.3.142 179.215.22.199 77.29.59.241
215.30.124.0 177.232.234.102 101.158.40.9 120.56.250.4
73.36.59.117 5.112.17.108 185.225.84.104 14.239.209.146