Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.140.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.140.63.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 134 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:36:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
63.140.148.132.in-addr.arpa domain name pointer ip-132-148-140-63.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
63.140.148.132.in-addr.arpa	name = ip-132-148-140-63.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.214.51.30 attackbotsspam
1593489128 - 06/30/2020 05:52:08 Host: 186.214.51.30/186.214.51.30 Port: 445 TCP Blocked
2020-06-30 16:20:33
46.38.150.153 attackspam
2020-06-30 08:20:22 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=rss@mail.csmailer.org)
2020-06-30 08:20:49 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=legion@mail.csmailer.org)
2020-06-30 08:21:35 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=api3@mail.csmailer.org)
2020-06-30 08:21:52 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=wix@mail.csmailer.org)
2020-06-30 08:22:13 auth_plain authenticator failed for (User) [46.38.150.153]: 535 Incorrect authentication data (set_id=smpp@mail.csmailer.org)
...
2020-06-30 16:41:16
200.81.53.0 attackbots
Jun 30 07:53:19 rotator sshd\[12732\]: Invalid user fff from 200.81.53.0Jun 30 07:53:21 rotator sshd\[12732\]: Failed password for invalid user fff from 200.81.53.0 port 59646 ssh2Jun 30 08:00:41 rotator sshd\[14313\]: Invalid user mcserver from 200.81.53.0Jun 30 08:00:43 rotator sshd\[14313\]: Failed password for invalid user mcserver from 200.81.53.0 port 38088 ssh2Jun 30 08:02:33 rotator sshd\[14334\]: Invalid user xyz from 200.81.53.0Jun 30 08:02:34 rotator sshd\[14334\]: Failed password for invalid user xyz from 200.81.53.0 port 53854 ssh2
...
2020-06-30 16:06:36
123.59.28.66 attackspam
DATE:2020-06-30 05:51:37, IP:123.59.28.66, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-06-30 16:44:25
103.228.162.125 attackbotsspam
$f2bV_matches
2020-06-30 16:15:08
125.24.200.89 attack
Jun 30 09:01:02 hni-server sshd[20382]: Did not receive identification string from 125.24.200.89
Jun 30 09:01:06 hni-server sshd[20392]: Invalid user admin2 from 125.24.200.89
Jun 30 09:01:06 hni-server sshd[20392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.24.200.89
Jun 30 09:01:09 hni-server sshd[20392]: Failed password for invalid user admin2 from 125.24.200.89 port 46371 ssh2
Jun 30 09:01:09 hni-server sshd[20392]: Connection closed by 125.24.200.89 port 46371 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.24.200.89
2020-06-30 16:18:31
89.248.174.132 attackspambots
Jun 30 09:56:33 debian-2gb-nbg1-2 kernel: \[15762432.635763\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.174.132 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=44446 PROTO=TCP SPT=55386 DPT=28517 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-30 16:06:01
101.51.39.199 attackspam
Jun 30 03:52:06 localhost sshd\[22183\]: Invalid user supervisor from 101.51.39.199 port 64573
Jun 30 03:52:06 localhost sshd\[22183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.51.39.199
Jun 30 03:52:08 localhost sshd\[22183\]: Failed password for invalid user supervisor from 101.51.39.199 port 64573 ssh2
...
2020-06-30 16:20:16
120.92.119.90 attackspam
$f2bV_matches
2020-06-30 16:14:13
68.183.236.29 attackspam
Jun 30 08:41:29 ajax sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29 
Jun 30 08:41:31 ajax sshd[21935]: Failed password for invalid user minecraft from 68.183.236.29 port 50094 ssh2
2020-06-30 15:58:23
52.180.168.48 attackspambots
unauthorized connection attempt
2020-06-30 16:21:37
200.160.111.44 attack
2020-06-30T03:47:24.825748abusebot-3.cloudsearch.cf sshd[2217]: Invalid user nat from 200.160.111.44 port 60774
2020-06-30T03:47:24.832350abusebot-3.cloudsearch.cf sshd[2217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44
2020-06-30T03:47:24.825748abusebot-3.cloudsearch.cf sshd[2217]: Invalid user nat from 200.160.111.44 port 60774
2020-06-30T03:47:26.844038abusebot-3.cloudsearch.cf sshd[2217]: Failed password for invalid user nat from 200.160.111.44 port 60774 ssh2
2020-06-30T03:52:33.827842abusebot-3.cloudsearch.cf sshd[2384]: Invalid user pau from 200.160.111.44 port 32968
2020-06-30T03:52:33.833908abusebot-3.cloudsearch.cf sshd[2384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.160.111.44
2020-06-30T03:52:33.827842abusebot-3.cloudsearch.cf sshd[2384]: Invalid user pau from 200.160.111.44 port 32968
2020-06-30T03:52:35.931179abusebot-3.cloudsearch.cf sshd[2384]: Failed password f
...
2020-06-30 15:58:48
34.67.145.173 attackbots
Invalid user admin from 34.67.145.173 port 38708
2020-06-30 16:05:27
139.199.164.21 attack
Jun 30 05:55:54 124388 sshd[1689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.21
Jun 30 05:55:54 124388 sshd[1689]: Invalid user techno from 139.199.164.21 port 49822
Jun 30 05:55:56 124388 sshd[1689]: Failed password for invalid user techno from 139.199.164.21 port 49822 ssh2
Jun 30 05:57:52 124388 sshd[1884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.21  user=root
Jun 30 05:57:54 124388 sshd[1884]: Failed password for root from 139.199.164.21 port 41360 ssh2
2020-06-30 16:25:06
162.243.133.47 attackspambots
8098/tcp
[2020-06-30]1pkt
2020-06-30 16:16:56

Recently Reported IPs

132.148.141.72 132.148.142.109 132.148.144.35 132.148.144.122
132.148.149.237 132.148.147.60 132.148.149.24 132.148.149.246
132.148.152.41 132.148.150.106 132.148.155.108 132.148.152.8
132.148.158.197 132.148.159.166 132.148.16.88 132.148.165.28
132.148.164.54 132.148.165.189 132.148.17.216 132.148.167.32