Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.140.217.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.140.217.216.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:42:39 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 216.217.140.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.140.217.216.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
189.154.182.245 attack
unauthorized connection attempt
2020-01-12 14:06:19
177.47.192.71 attackspam
unauthorized connection attempt
2020-01-12 14:27:39
175.115.223.201 attackspambots
unauthorized connection attempt
2020-01-12 14:29:00
31.145.27.234 attackspambots
unauthorized connection attempt
2020-01-12 14:09:25
191.5.180.104 attack
unauthorized connection attempt
2020-01-12 14:05:10
138.117.62.50 attack
Unauthorized connection attempt detected from IP address 138.117.62.50 to port 88 [J]
2020-01-12 14:23:37
197.38.106.71 attack
unauthorized connection attempt
2020-01-12 14:22:27
123.233.246.52 attackspambots
Jan 11 23:57:15 web1 postfix/smtpd[11030]: warning: unknown[123.233.246.52]: SASL LOGIN authentication failed: authentication failure
...
2020-01-12 14:14:00
222.186.52.86 attackspam
Jan 12 01:15:47 ny01 sshd[12939]: Failed password for root from 222.186.52.86 port 14912 ssh2
Jan 12 01:18:08 ny01 sshd[13172]: Failed password for root from 222.186.52.86 port 14227 ssh2
2020-01-12 14:49:31
85.110.29.195 attackspambots
unauthorized connection attempt
2020-01-12 14:43:11
109.200.243.242 attack
unauthorized connection attempt
2020-01-12 14:14:51
182.93.86.242 attack
unauthorized connection attempt
2020-01-12 13:58:51
77.75.129.123 attackbotsspam
unauthorized connection attempt
2020-01-12 14:19:16
188.158.85.75 attack
unauthorized connection attempt
2020-01-12 14:16:48
220.136.12.50 attackbots
Automatic report - Port Scan
2020-01-12 14:22:04

Recently Reported IPs

40.107.88.23 7.105.150.116 120.72.41.109 205.72.161.66
172.230.36.123 87.252.51.15 141.161.165.247 3.229.226.41
55.17.162.91 104.147.254.172 103.135.135.169 8.48.91.52
147.246.253.101 121.76.247.67 255.255.253.149 143.167.171.23
138.193.15.187 197.99.65.105 171.163.63.125 170.113.146.213