Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.140.198.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12182
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.140.198.124.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 00:46:16 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 124.198.140.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.140.198.124.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
171.252.250.93 attack
 TCP (SYN) 171.252.250.93:10114 -> port 9530, len 44
2020-05-25 15:09:58
118.126.113.29 attackbotsspam
May 25 06:04:53 localhost sshd\[27055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.113.29  user=root
May 25 06:04:54 localhost sshd\[27055\]: Failed password for root from 118.126.113.29 port 52979 ssh2
May 25 06:07:59 localhost sshd\[27339\]: Invalid user Administrator from 118.126.113.29
May 25 06:07:59 localhost sshd\[27339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.113.29
May 25 06:08:01 localhost sshd\[27339\]: Failed password for invalid user Administrator from 118.126.113.29 port 43071 ssh2
...
2020-05-25 15:05:24
14.98.213.14 attack
Failed password for invalid user csgo from 14.98.213.14 port 38198 ssh2
2020-05-25 15:12:51
180.164.180.120 attack
May 25 03:48:56 vlre-nyc-1 sshd\[9388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.180.120  user=root
May 25 03:48:59 vlre-nyc-1 sshd\[9388\]: Failed password for root from 180.164.180.120 port 34248 ssh2
May 25 03:50:26 vlre-nyc-1 sshd\[9427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.180.120  user=root
May 25 03:50:28 vlre-nyc-1 sshd\[9427\]: Failed password for root from 180.164.180.120 port 57122 ssh2
May 25 03:52:02 vlre-nyc-1 sshd\[9468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.164.180.120  user=root
...
2020-05-25 15:16:16
142.93.195.15 attackbotsspam
May 25 09:11:00 [host] sshd[17806]: Invalid user z
May 25 09:11:00 [host] sshd[17806]: pam_unix(sshd:
May 25 09:11:02 [host] sshd[17806]: Failed passwor
2020-05-25 15:24:50
218.92.0.165 attackbots
2020-05-25T07:22:23.541269shield sshd\[5657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
2020-05-25T07:22:25.280210shield sshd\[5657\]: Failed password for root from 218.92.0.165 port 46302 ssh2
2020-05-25T07:22:28.680254shield sshd\[5657\]: Failed password for root from 218.92.0.165 port 46302 ssh2
2020-05-25T07:22:31.824731shield sshd\[5657\]: Failed password for root from 218.92.0.165 port 46302 ssh2
2020-05-25T07:22:35.521430shield sshd\[5657\]: Failed password for root from 218.92.0.165 port 46302 ssh2
2020-05-25 15:23:34
203.130.21.6 attackbots
DATE:2020-05-25 05:52:36, IP:203.130.21.6, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-05-25 14:59:59
103.36.17.14 attack
1590378784 - 05/25/2020 05:53:04 Host: 103.36.17.14/103.36.17.14 Port: 445 TCP Blocked
2020-05-25 14:43:57
120.53.24.140 attackbots
Invalid user matthew from 120.53.24.140 port 55412
2020-05-25 15:08:15
106.13.213.118 attackspam
Failed password for invalid user admin from 106.13.213.118 port 45108 ssh2
2020-05-25 15:03:20
198.154.99.175 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-25 15:16:49
188.166.34.129 attackspambots
May 25 08:22:13 buvik sshd[21829]: Failed password for invalid user dayspringhardwoo from 188.166.34.129 port 37954 ssh2
May 25 08:27:18 buvik sshd[22556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.34.129  user=root
May 25 08:27:19 buvik sshd[22556]: Failed password for root from 188.166.34.129 port 44370 ssh2
...
2020-05-25 14:44:19
223.247.219.165 attack
May 24 21:48:55 server1 sshd\[9688\]: Invalid user ping from 223.247.219.165
May 24 21:48:55 server1 sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.219.165 
May 24 21:48:57 server1 sshd\[9688\]: Failed password for invalid user ping from 223.247.219.165 port 34826 ssh2
May 24 21:51:55 server1 sshd\[10548\]: Invalid user mzk from 223.247.219.165
May 24 21:51:55 server1 sshd\[10548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.219.165 
...
2020-05-25 15:22:08
107.170.63.221 attackspambots
May 25 01:44:04 NPSTNNYC01T sshd[17288]: Failed password for root from 107.170.63.221 port 42844 ssh2
May 25 01:48:33 NPSTNNYC01T sshd[17710]: Failed password for root from 107.170.63.221 port 46530 ssh2
May 25 01:53:12 NPSTNNYC01T sshd[18091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.63.221
...
2020-05-25 15:17:36
195.54.160.180 attack
Port scan and tries to use standard accounts to login.
2020-05-25 14:45:11

Recently Reported IPs

103.166.23.190 242.153.105.190 37.92.167.78 206.59.111.185
120.30.140.129 64.148.54.73 160.13.123.202 182.135.245.4
68.173.242.191 66.6.219.18 207.66.222.35 205.51.221.243
232.176.132.93 92.200.76.86 55.148.223.36 93.44.113.39
34.164.9.227 172.154.240.207 56.121.103.94 219.146.182.127