Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.198.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.198.138.		IN	A

;; AUTHORITY SECTION:
.			572	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 05:39:19 CST 2022
;; MSG SIZE  rcvd: 108
Host info
138.198.148.132.in-addr.arpa domain name pointer ip-132-148-198-138.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.198.148.132.in-addr.arpa	name = ip-132-148-198-138.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
172.81.235.131 attack
Jul 25 22:14:04 abendstille sshd\[16850\]: Invalid user geraldo from 172.81.235.131
Jul 25 22:14:04 abendstille sshd\[16850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.235.131
Jul 25 22:14:05 abendstille sshd\[16850\]: Failed password for invalid user geraldo from 172.81.235.131 port 58606 ssh2
Jul 25 22:18:01 abendstille sshd\[21538\]: Invalid user tom from 172.81.235.131
Jul 25 22:18:02 abendstille sshd\[21538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.235.131
...
2020-07-26 04:21:25
128.199.121.32 attackbotsspam
Exploited Host.
2020-07-26 04:26:55
83.97.20.234 attack
SSH Brute-Force. Ports scanning.
2020-07-26 04:27:32
90.93.188.157 attackspambots
Invalid user tech from 90.93.188.157 port 60811
2020-07-26 04:27:21
125.91.32.157 attackspam
Exploited Host.
2020-07-26 04:34:43
98.28.237.0 attackbotsspam
SSH User Authentication Brute Force Attempt , PTR: cpe-98-28-237-0.cinci.res.rr.com.
2020-07-26 04:30:44
106.54.206.184 attackspambots
Jul 25 17:07:33 ip-172-31-61-156 sshd[10002]: Failed password for invalid user test from 106.54.206.184 port 54244 ssh2
Jul 25 17:07:31 ip-172-31-61-156 sshd[10002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.206.184
Jul 25 17:07:31 ip-172-31-61-156 sshd[10002]: Invalid user test from 106.54.206.184
Jul 25 17:07:33 ip-172-31-61-156 sshd[10002]: Failed password for invalid user test from 106.54.206.184 port 54244 ssh2
Jul 25 17:09:39 ip-172-31-61-156 sshd[10266]: Invalid user kokila from 106.54.206.184
...
2020-07-26 04:35:09
200.44.229.214 attackbots
Zeroshell Net Services Remote Command Execution Vulnerability, PTR: 200.44.229-214.dyn.dsl.cantv.net.
2020-07-26 04:55:35
190.96.246.31 attackbotsspam
Jul 25 17:13:40 pl3server sshd[11538]: Invalid user guest from 190.96.246.31 port 24481
Jul 25 17:13:40 pl3server sshd[11538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.246.31
Jul 25 17:13:42 pl3server sshd[11538]: Failed password for invalid user guest from 190.96.246.31 port 24481 ssh2
Jul 25 17:13:42 pl3server sshd[11538]: Received disconnect from 190.96.246.31 port 24481:11: Bye Bye [preauth]
Jul 25 17:13:42 pl3server sshd[11538]: Disconnected from 190.96.246.31 port 24481 [preauth]
Jul 25 17:18:29 pl3server sshd[15828]: Invalid user kmw from 190.96.246.31 port 11649
Jul 25 17:18:29 pl3server sshd[15828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.96.246.31


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.96.246.31
2020-07-26 04:24:33
118.25.100.183 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-26 04:23:33
116.108.48.130 attack
[MK-Root1] Blocked by UFW
2020-07-26 04:57:21
180.168.47.238 attack
Jul 26 01:21:10 webhost01 sshd[28518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.47.238
Jul 26 01:21:12 webhost01 sshd[28518]: Failed password for invalid user pm from 180.168.47.238 port 40500 ssh2
...
2020-07-26 04:54:20
125.212.203.113 attackbotsspam
Jul 25 21:59:42 piServer sshd[19783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 
Jul 25 21:59:44 piServer sshd[19783]: Failed password for invalid user brendan from 125.212.203.113 port 47036 ssh2
Jul 25 22:04:27 piServer sshd[20239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.203.113 
...
2020-07-26 04:45:43
82.165.118.127 attack
25-7-2020 17:12:52	Unauthorized connection attempt (Brute-Force).
25-7-2020 17:12:52	Connection from IP address: 82.165.118.127 on port: 993


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.165.118.127
2020-07-26 04:35:49
61.177.172.61 attack
Jul 25 22:30:58 ip106 sshd[11614]: Failed password for root from 61.177.172.61 port 15525 ssh2
Jul 25 22:31:04 ip106 sshd[11614]: Failed password for root from 61.177.172.61 port 15525 ssh2
...
2020-07-26 04:36:21

Recently Reported IPs

118.172.59.109 132.148.197.255 132.148.198.203 132.148.198.177
132.148.198.35 132.148.198.216 132.148.199.119 132.148.2.98
132.148.20.250 132.148.199.188 132.148.2.239 132.148.200.198
132.148.201.25 132.148.201.35 132.148.201.129 118.172.59.112
132.148.201.65 132.148.202.136 132.148.202.174 132.148.200.155