Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.101.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44162
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.101.139.		IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:38:52 CST 2022
;; MSG SIZE  rcvd: 108
Host info
139.101.148.132.in-addr.arpa domain name pointer ip-132-148-101-139.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.101.148.132.in-addr.arpa	name = ip-132-148-101-139.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.213.131.237 attackspam
" "
2020-05-15 08:16:05
49.235.134.46 attackbotsspam
2020-05-14T22:56:31.592310amanda2.illicoweb.com sshd\[3110\]: Invalid user deploy from 49.235.134.46 port 60172
2020-05-14T22:56:31.597560amanda2.illicoweb.com sshd\[3110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.134.46
2020-05-14T22:56:33.948860amanda2.illicoweb.com sshd\[3110\]: Failed password for invalid user deploy from 49.235.134.46 port 60172 ssh2
2020-05-14T23:01:13.081704amanda2.illicoweb.com sshd\[3543\]: Invalid user mc from 49.235.134.46 port 52950
2020-05-14T23:01:13.087066amanda2.illicoweb.com sshd\[3543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.134.46
...
2020-05-15 07:54:50
37.187.225.141 attack
37.187.225.141 - - [07/Apr/2020:05:00:23 +0200] "GET /phpmyadmin HTTP/1.1" 404 454
...
2020-05-15 08:16:25
119.28.178.226 attack
Invalid user art from 119.28.178.226 port 60694
2020-05-15 08:12:03
34.192.8.69 attackbots
Fail2Ban Ban Triggered
HTTP Exploit Attempt
2020-05-15 07:53:31
88.231.29.166 attack
May 14 22:53:29 vmd48417 sshd[8627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.231.29.166
2020-05-15 07:44:43
217.182.70.150 attack
SSH Invalid Login
2020-05-15 08:10:25
206.189.118.7 attackspambots
May 15 00:55:52 santamaria sshd\[19836\]: Invalid user testi from 206.189.118.7
May 15 00:55:52 santamaria sshd\[19836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.118.7
May 15 00:55:54 santamaria sshd\[19836\]: Failed password for invalid user testi from 206.189.118.7 port 38956 ssh2
...
2020-05-15 07:52:04
59.120.103.137 attackbotsspam
" "
2020-05-15 07:56:07
91.218.85.69 attack
May 15 04:14:37 gw1 sshd[13090]: Failed password for root from 91.218.85.69 port 12582 ssh2
...
2020-05-15 07:57:46
45.89.233.98 attackspambots
45.89.233.98 - - [21/Apr/2020:19:57:10 +0200] "GET /wp-login.php HTTP/1.1" 302 536
...
2020-05-15 07:48:15
121.42.244.223 attack
121.42.244.223 - - [14/May/2020:22:53:16 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
121.42.244.223 - - [14/May/2020:22:53:17 +0200] "POST /wp-login.php HTTP/1.1" 200 2031 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
121.42.244.223 - - [14/May/2020:22:53:18 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
121.42.244.223 - - [14/May/2020:22:53:19 +0200] "POST /wp-login.php HTTP/1.1" 200 2008 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
121.42.244.223 - - [14/May/2020:22:53:21 +0200] "GET /wp-login.php HTTP/1.1" 200 1900 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
121.42.244.223 - - [14/May/2020:22:53:22 +0200] "POST /wp-login.php HTTP/1.1" 200 2009 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-05-15 07:51:27
49.234.106.97 attackspam
May 14 23:34:32 h2829583 sshd[16299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.106.97
2020-05-15 07:55:50
186.122.148.9 attackspambots
SSH Invalid Login
2020-05-15 07:59:10
124.250.83.16 attackbots
May 14 23:54:09 h1745522 sshd[13854]: Invalid user postgres from 124.250.83.16 port 39416
May 14 23:54:09 h1745522 sshd[13854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.250.83.16
May 14 23:54:09 h1745522 sshd[13854]: Invalid user postgres from 124.250.83.16 port 39416
May 14 23:54:11 h1745522 sshd[13854]: Failed password for invalid user postgres from 124.250.83.16 port 39416 ssh2
May 14 23:57:38 h1745522 sshd[14091]: Invalid user uwsgi from 124.250.83.16 port 21202
May 14 23:57:38 h1745522 sshd[14091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.250.83.16
May 14 23:57:38 h1745522 sshd[14091]: Invalid user uwsgi from 124.250.83.16 port 21202
May 14 23:57:41 h1745522 sshd[14091]: Failed password for invalid user uwsgi from 124.250.83.16 port 21202 ssh2
May 15 00:00:58 h1745522 sshd[15515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.250.83.16
...
2020-05-15 07:54:04

Recently Reported IPs

132.148.103.130 118.172.58.67 132.148.103.249 118.172.58.69
118.172.58.72 118.172.58.79 118.172.58.80 118.172.58.85
118.172.58.88 132.148.165.213 132.148.165.76 132.148.166.90
132.148.166.96 132.148.167.112 132.148.166.19 132.148.166.60
132.148.166.29 132.148.165.241 132.148.166.86 132.148.165.219