Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.138.33.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.138.33.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 16:34:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 83.33.138.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.138.33.83.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.61.47.132 attackbotsspam
Feb 21 18:35:23 gw1 sshd[10015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.61.47.132
Feb 21 18:35:25 gw1 sshd[10015]: Failed password for invalid user robert from 218.61.47.132 port 58725 ssh2
...
2020-02-22 03:22:40
218.92.0.171 attack
Feb 21 20:26:19 server sshd[3042111]: Failed none for root from 218.92.0.171 port 42952 ssh2
Feb 21 20:26:22 server sshd[3042111]: Failed password for root from 218.92.0.171 port 42952 ssh2
Feb 21 20:26:27 server sshd[3042111]: Failed password for root from 218.92.0.171 port 42952 ssh2
2020-02-22 03:28:25
93.149.79.247 attack
$f2bV_matches
2020-02-22 03:09:03
197.248.64.114 attack
Unauthorized connection attempt from IP address 197.248.64.114 on Port 445(SMB)
2020-02-22 03:05:26
103.78.148.84 attackspam
Unauthorized connection attempt from IP address 103.78.148.84 on Port 445(SMB)
2020-02-22 03:35:55
114.67.239.170 attack
Feb 21 19:28:16 gw1 sshd[12519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.239.170
Feb 21 19:28:18 gw1 sshd[12519]: Failed password for invalid user couch from 114.67.239.170 port 53152 ssh2
...
2020-02-22 03:27:57
139.59.80.65 attackspam
Feb 21 17:09:15 legacy sshd[31591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.80.65
Feb 21 17:09:17 legacy sshd[31591]: Failed password for invalid user hadoop from 139.59.80.65 port 57650 ssh2
Feb 21 17:12:49 legacy sshd[31636]: Failed password for root from 139.59.80.65 port 59070 ssh2
...
2020-02-22 03:01:41
220.246.26.51 attack
(sshd) Failed SSH login from 220.246.26.51 (HK/Hong Kong/n220246026051.netvigator.com): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Feb 21 12:40:10 host sshd[11892]: Invalid user alexis from 220.246.26.51 port 42735
2020-02-22 03:19:47
122.51.191.69 attackspambots
(sshd) Failed SSH login from 122.51.191.69 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Feb 21 15:31:35 elude sshd[22669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69  user=root
Feb 21 15:31:38 elude sshd[22669]: Failed password for root from 122.51.191.69 port 47708 ssh2
Feb 21 15:53:31 elude sshd[23974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.191.69  user=news
Feb 21 15:53:33 elude sshd[23974]: Failed password for news from 122.51.191.69 port 57732 ssh2
Feb 21 15:57:51 elude sshd[24205]: Invalid user lisha from 122.51.191.69 port 50772
2020-02-22 03:08:35
118.32.108.78 attackbots
firewall-block, port(s): 8000/tcp
2020-02-22 03:06:42
202.179.8.98 attack
proto=tcp  .  spt=48590  .  dpt=25  .     Listed on    truncate-gbudb also unsubscore and rbldns-ru     (242)
2020-02-22 02:56:23
180.253.99.198 attackspambots
Unauthorized connection attempt from IP address 180.253.99.198 on Port 445(SMB)
2020-02-22 03:15:16
51.91.212.81 attackbots
02/21/2020-13:37:52.989484 51.91.212.81 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 52
2020-02-22 03:25:09
177.94.206.115 attackspam
Unauthorized connection attempt from IP address 177.94.206.115 on Port 445(SMB)
2020-02-22 03:04:04
170.84.48.82 attackbots
Unauthorized connection attempt from IP address 170.84.48.82 on Port 445(SMB)
2020-02-22 03:12:03

Recently Reported IPs

29.145.184.217 46.117.38.169 95.246.147.20 103.234.141.61
197.201.208.40 72.121.180.199 185.182.252.182 223.29.249.189
135.250.88.113 244.132.174.222 23.27.8.35 100.186.144.6
159.5.82.237 21.169.200.119 107.24.150.229 197.180.247.59
206.231.147.205 246.71.173.28 48.77.176.90 133.18.21.13