Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.145.232.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18977
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.145.232.124.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 01:22:10 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 124.232.145.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 124.232.145.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.206.128.6 attackspambots
firewall-block, port(s): 161/udp
2019-12-28 04:47:27
190.57.230.243 attackbots
3389BruteforceFW21
2019-12-28 04:49:31
111.229.34.241 attackbotsspam
$f2bV_matches
2019-12-28 04:31:28
111.92.84.74 attackbots
SIP/5060 Probe, BF, Hack -
2019-12-28 04:57:09
36.69.222.149 attackbotsspam
Unauthorized connection attempt from IP address 36.69.222.149 on Port 445(SMB)
2019-12-28 04:59:18
82.208.17.144 attack
www.lust-auf-land.com 82.208.17.144 [27/Dec/2019:18:33:02 +0100] "POST /wp-login.php HTTP/1.1" 200 6403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.lust-auf-land.com 82.208.17.144 [27/Dec/2019:18:33:03 +0100] "POST /wp-login.php HTTP/1.1" 200 6364 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-28 04:44:17
180.241.227.15 attackbotsspam
1577457986 - 12/27/2019 15:46:26 Host: 180.241.227.15/180.241.227.15 Port: 445 TCP Blocked
2019-12-28 04:45:20
109.201.155.16 attackbots
Invalid user guest from 109.201.155.16 port 50434
2019-12-28 04:29:23
85.93.20.70 attackspam
Port Scanning MultiHosts
2019-12-28 04:45:51
67.205.144.236 attack
Dec 27 20:56:17 mout sshd[27640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.144.236  user=root
Dec 27 20:56:19 mout sshd[27640]: Failed password for root from 67.205.144.236 port 57026 ssh2
2019-12-28 04:45:37
104.206.128.34 attackbots
Unauthorised access (Dec 27) SRC=104.206.128.34 LEN=44 TTL=237 ID=26934 TCP DPT=1433 WINDOW=1024 SYN
2019-12-28 04:58:40
112.124.50.81 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-28 04:44:50
164.132.110.223 attackbots
Dec 27 16:46:16 MK-Soft-VM7 sshd[5395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.110.223 
Dec 27 16:46:18 MK-Soft-VM7 sshd[5395]: Failed password for invalid user 7y6t5r from 164.132.110.223 port 58839 ssh2
...
2019-12-28 04:56:29
185.143.221.55 attackspam
Dec 27 20:46:12 h2177944 kernel: \[674679.744854\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=7536 PROTO=TCP SPT=52855 DPT=3391 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 27 20:46:12 h2177944 kernel: \[674679.744866\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=7536 PROTO=TCP SPT=52855 DPT=3391 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 27 21:27:46 h2177944 kernel: \[677173.900065\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=47507 PROTO=TCP SPT=52855 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 27 21:27:46 h2177944 kernel: \[677173.900079\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.55 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=47507 PROTO=TCP SPT=52855 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 27 21:35:15 h2177944 kernel: \[677622.258559\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.143.221.55 DST=85.214.117.9 L
2019-12-28 04:35:55
103.98.176.248 attack
Unauthorized connection attempt detected from IP address 103.98.176.248 to port 22
2019-12-28 04:36:33

Recently Reported IPs

75.43.198.253 156.255.169.15 87.118.254.56 211.232.116.147
125.42.136.77 73.79.28.18 89.37.79.15 223.147.181.105
112.230.56.26 108.41.92.62 95.111.5.234 119.137.122.18
83.162.29.19 56.141.109.124 92.212.79.76 195.196.216.44
179.94.123.149 189.220.7.86 194.207.114.162 73.117.8.68