Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.145.66.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.145.66.51.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:57:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 51.66.145.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.66.145.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.165 attackspambots
SSH Bruteforce attack
2019-08-20 03:22:39
168.90.139.20 attackbotsspam
Automatic report - Port Scan Attack
2019-08-20 02:50:54
80.82.70.239 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-20 03:23:35
49.146.7.117 attack
Unauthorized connection attempt from IP address 49.146.7.117 on Port 445(SMB)
2019-08-20 02:57:56
119.75.24.68 attackbots
Aug 19 21:15:16 host sshd\[35582\]: Invalid user candy from 119.75.24.68 port 33472
Aug 19 21:15:16 host sshd\[35582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.75.24.68
...
2019-08-20 03:20:21
51.158.117.17 attack
Automated report - ssh fail2ban:
Aug 19 20:05:48 authentication failure 
Aug 19 20:05:50 wrong password, user=abner, port=57726, ssh2
Aug 19 20:37:20 authentication failure
2019-08-20 02:56:57
94.195.149.38 attack
scan z
2019-08-20 03:01:03
217.165.242.7 attackspam
Port Scan: TCP/445
2019-08-20 02:44:49
1.195.37.209 attack
Unauthorized connection attempt from IP address 1.195.37.209 on Port 445(SMB)
2019-08-20 02:53:09
139.199.100.51 attackspambots
Aug 19 14:59:04 plusreed sshd[12342]: Invalid user kong from 139.199.100.51
...
2019-08-20 03:16:48
128.199.107.252 attackbots
Aug 19 09:01:01 hpm sshd\[20989\]: Invalid user op from 128.199.107.252
Aug 19 09:01:01 hpm sshd\[20989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252
Aug 19 09:01:03 hpm sshd\[20989\]: Failed password for invalid user op from 128.199.107.252 port 43380 ssh2
Aug 19 09:07:14 hpm sshd\[21457\]: Invalid user family from 128.199.107.252
Aug 19 09:07:14 hpm sshd\[21457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252
2019-08-20 03:14:14
95.170.196.86 attackspam
Automatic report - Port Scan Attack
2019-08-20 02:47:24
85.240.166.27 attackbotsspam
Autoban   85.240.166.27 AUTH/CONNECT
2019-08-20 03:16:12
149.129.224.33 attack
Unauthorised access (Aug 19) SRC=149.129.224.33 LEN=40 TTL=49 ID=60314 TCP DPT=8080 WINDOW=54569 SYN
2019-08-20 02:46:34
94.254.5.234 attackbotsspam
Aug 19 20:58:50 rpi sshd[4724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.254.5.234 
Aug 19 20:58:51 rpi sshd[4724]: Failed password for invalid user jojo from 94.254.5.234 port 43997 ssh2
2019-08-20 03:26:01

Recently Reported IPs

132.148.101.11 131.94.232.43 132.148.100.112 104.21.92.150
132.148.101.219 104.21.92.161 104.21.92.171 104.21.92.173
104.21.92.236 104.21.92.238 104.21.92.239 132.148.192.216
132.148.198.235 132.148.199.127 132.148.195.76 132.148.199.185
132.148.2.51 132.148.181.127 132.148.181.102 104.21.92.253