Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.134.116.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30748
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.134.116.118.		IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:20:45 CST 2022
;; MSG SIZE  rcvd: 108
Host info
b'Host 118.116.134.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 118.116.134.132.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
180.179.48.101 attackspam
Feb  5 23:26:13 tuxlinux sshd[56018]: Invalid user vmi from 180.179.48.101 port 43011
Feb  5 23:26:13 tuxlinux sshd[56018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.48.101 
Feb  5 23:26:13 tuxlinux sshd[56018]: Invalid user vmi from 180.179.48.101 port 43011
Feb  5 23:26:13 tuxlinux sshd[56018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.48.101 
Feb  5 23:26:13 tuxlinux sshd[56018]: Invalid user vmi from 180.179.48.101 port 43011
Feb  5 23:26:13 tuxlinux sshd[56018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.179.48.101 
Feb  5 23:26:15 tuxlinux sshd[56018]: Failed password for invalid user vmi from 180.179.48.101 port 43011 ssh2
...
2020-02-06 06:49:54
211.137.225.57 attack
Unauthorized connection attempt detected from IP address 211.137.225.57 to port 2323 [J]
2020-02-06 06:11:49
195.54.166.70 attack
A portscan was detected. Details about the event:
Time.............: 2020-02-05 13:10:33
Source IP address: 195.54.166.70
2020-02-06 06:31:22
65.151.176.53 attackspambots
Feb  4 10:45:27 josie sshd[30737]: Invalid user nina from 65.151.176.53
Feb  4 10:45:27 josie sshd[30737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.176.53 
Feb  4 10:45:29 josie sshd[30737]: Failed password for invalid user nina from 65.151.176.53 port 48628 ssh2
Feb  4 10:45:29 josie sshd[30738]: Received disconnect from 65.151.176.53: 11: Bye Bye
Feb  4 10:46:37 josie sshd[31936]: Invalid user lysenko from 65.151.176.53
Feb  4 10:46:37 josie sshd[31936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.176.53 
Feb  4 10:46:39 josie sshd[31936]: Failed password for invalid user lysenko from 65.151.176.53 port 56702 ssh2
Feb  4 10:46:39 josie sshd[31941]: Received disconnect from 65.151.176.53: 11: Bye Bye
Feb  4 10:49:42 josie sshd[4138]: Invalid user cedric from 65.151.176.53
Feb  4 10:49:42 josie sshd[4138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e........
-------------------------------
2020-02-06 06:37:08
113.193.30.98 attack
Unauthorized connection attempt detected from IP address 113.193.30.98 to port 2220 [J]
2020-02-06 06:26:09
119.118.191.67 attackspambots
Unauthorized connection attempt detected from IP address 119.118.191.67 to port 5555 [J]
2020-02-06 06:24:26
182.61.43.202 attack
Feb  5 12:23:26 web9 sshd\[2903\]: Invalid user edf from 182.61.43.202
Feb  5 12:23:26 web9 sshd\[2903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.202
Feb  5 12:23:27 web9 sshd\[2903\]: Failed password for invalid user edf from 182.61.43.202 port 41418 ssh2
Feb  5 12:26:32 web9 sshd\[3475\]: Invalid user cky from 182.61.43.202
Feb  5 12:26:32 web9 sshd\[3475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.202
2020-02-06 06:31:46
45.180.73.172 attackbotsspam
Unauthorized connection attempt detected from IP address 45.180.73.172 to port 23 [J]
2020-02-06 06:07:38
193.112.4.12 attackbotsspam
2020-02-05T22:24:11.474243abusebot-2.cloudsearch.cf sshd[9823]: Invalid user oxc from 193.112.4.12 port 37436
2020-02-05T22:24:11.480579abusebot-2.cloudsearch.cf sshd[9823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12
2020-02-05T22:24:11.474243abusebot-2.cloudsearch.cf sshd[9823]: Invalid user oxc from 193.112.4.12 port 37436
2020-02-05T22:24:13.299232abusebot-2.cloudsearch.cf sshd[9823]: Failed password for invalid user oxc from 193.112.4.12 port 37436 ssh2
2020-02-05T22:26:14.559496abusebot-2.cloudsearch.cf sshd[9929]: Invalid user opf from 193.112.4.12 port 57508
2020-02-05T22:26:14.564551abusebot-2.cloudsearch.cf sshd[9929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12
2020-02-05T22:26:14.559496abusebot-2.cloudsearch.cf sshd[9929]: Invalid user opf from 193.112.4.12 port 57508
2020-02-05T22:26:16.267701abusebot-2.cloudsearch.cf sshd[9929]: Failed password for invalid use
...
2020-02-06 06:47:33
179.229.153.52 attack
Unauthorized connection attempt detected from IP address 179.229.153.52 to port 22 [J]
2020-02-06 06:18:33
177.23.184.99 attackspam
Unauthorized connection attempt detected from IP address 177.23.184.99 to port 2220 [J]
2020-02-06 06:19:10
179.211.20.11 attack
Unauthorized connection attempt detected from IP address 179.211.20.11 to port 2323 [J]
2020-02-06 06:18:47
189.8.68.56 attackbots
Feb  5 23:26:36 MK-Soft-VM8 sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.8.68.56 
Feb  5 23:26:38 MK-Soft-VM8 sshd[20856]: Failed password for invalid user giv from 189.8.68.56 port 59552 ssh2
...
2020-02-06 06:28:34
151.196.57.128 attackspam
Unauthorized connection attempt detected from IP address 151.196.57.128 to port 2220 [J]
2020-02-06 06:20:47
192.184.90.241 attackbots
1580933475 - 02/05/2020 21:11:15 Host: 192.184.90.241/192.184.90.241 Port: 445 TCP Blocked
2020-02-06 06:15:26

Recently Reported IPs

212.219.185.188 138.175.80.128 138.13.213.39 148.46.73.96
25.94.143.231 136.130.54.131 112.154.123.207 217.110.199.28
180.2.162.84 106.228.113.165 108.203.195.50 191.56.123.72
132.103.206.83 198.7.104.229 169.148.7.52 128.62.45.215
2.185.62.20 114.31.165.112 117.176.77.246 109.94.184.163