Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.220.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.148.220.8.			IN	A

;; AUTHORITY SECTION:
.			6	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:52:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
8.220.148.132.in-addr.arpa domain name pointer ip-132-148-220-8.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
8.220.148.132.in-addr.arpa	name = ip-132-148-220-8.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.89.201.116 attack
Nov 22 03:30:43 shadeyouvpn sshd[22957]: Invalid user akin from 159.89.201.116
Nov 22 03:30:43 shadeyouvpn sshd[22957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.116 
Nov 22 03:30:45 shadeyouvpn sshd[22957]: Failed password for invalid user akin from 159.89.201.116 port 57534 ssh2
Nov 22 03:30:45 shadeyouvpn sshd[22957]: Received disconnect from 159.89.201.116: 11: Bye Bye [preauth]
Nov 22 03:42:12 shadeyouvpn sshd[30520]: Invalid user hannumem from 159.89.201.116
Nov 22 03:42:12 shadeyouvpn sshd[30520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.116 
Nov 22 03:42:14 shadeyouvpn sshd[30520]: Failed password for invalid user hannumem from 159.89.201.116 port 37190 ssh2
Nov 22 03:42:14 shadeyouvpn sshd[30520]: Received disconnect from 159.89.201.116: 11: Bye Bye [preauth]
Nov 22 03:46:07 shadeyouvpn sshd[32468]: pam_unix(sshd:auth): authentication failure; logn........
-------------------------------
2019-11-22 17:46:09
222.186.175.169 attack
Nov 21 23:29:52 hanapaa sshd\[18899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov 21 23:29:55 hanapaa sshd\[18899\]: Failed password for root from 222.186.175.169 port 18788 ssh2
Nov 21 23:30:09 hanapaa sshd\[18925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Nov 21 23:30:11 hanapaa sshd\[18925\]: Failed password for root from 222.186.175.169 port 24446 ssh2
Nov 21 23:30:29 hanapaa sshd\[18943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
2019-11-22 17:32:29
110.35.79.23 attack
Nov 22 04:05:31 TORMINT sshd\[25325\]: Invalid user abcdefghijklmnopqr from 110.35.79.23
Nov 22 04:05:31 TORMINT sshd\[25325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
Nov 22 04:05:33 TORMINT sshd\[25325\]: Failed password for invalid user abcdefghijklmnopqr from 110.35.79.23 port 47623 ssh2
...
2019-11-22 18:09:28
129.226.129.191 attackspam
Nov 22 07:24:49 dedicated sshd[14692]: Invalid user fuqua from 129.226.129.191 port 51170
2019-11-22 17:56:29
175.158.53.126 attack
Nov 22 07:06:32 mxgate1 postfix/postscreen[24303]: CONNECT from [175.158.53.126]:61551 to [176.31.12.44]:25
Nov 22 07:06:32 mxgate1 postfix/dnsblog[24327]: addr 175.158.53.126 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 22 07:06:32 mxgate1 postfix/dnsblog[24327]: addr 175.158.53.126 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 22 07:06:32 mxgate1 postfix/dnsblog[24329]: addr 175.158.53.126 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 22 07:06:32 mxgate1 postfix/dnsblog[24330]: addr 175.158.53.126 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 22 07:06:38 mxgate1 postfix/postscreen[24303]: DNSBL rank 4 for [175.158.53.126]:61551
Nov x@x
Nov 22 07:06:49 mxgate1 postfix/postscreen[24303]: HANGUP after 11 from [175.158.53.126]:61551 in tests after SMTP handshake
Nov 22 07:06:49 mxgate1 postfix/postscreen[24303]: DISCONNECT [175.158.53.126]:61551


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=175.158.53.126
2019-11-22 18:06:55
5.1.88.50 attack
$f2bV_matches
2019-11-22 17:51:40
36.57.90.243 attack
badbot
2019-11-22 18:02:30
51.255.168.127 attack
Nov 22 15:01:11 gw1 sshd[6814]: Failed password for root from 51.255.168.127 port 57196 ssh2
...
2019-11-22 18:11:57
193.70.8.163 attackbots
5x Failed Password
2019-11-22 17:53:22
123.139.146.229 attackspam
badbot
2019-11-22 18:04:03
114.231.136.200 attackspam
badbot
2019-11-22 17:46:37
46.166.151.47 attack
\[2019-11-22 04:37:39\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T04:37:39.823-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146406820574",SessionID="0x7f26c4832958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/50962",ACLName="no_extension_match"
\[2019-11-22 04:40:04\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T04:40:04.009-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="002146462607509",SessionID="0x7f26c4832958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/60424",ACLName="no_extension_match"
\[2019-11-22 04:45:55\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-22T04:45:55.750-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146406820574",SessionID="0x7f26c40441e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64385",ACLName="no_ext
2019-11-22 17:58:24
125.105.157.101 attackspambots
badbot
2019-11-22 18:06:28
117.240.183.251 attack
Unauthorised access (Nov 22) SRC=117.240.183.251 LEN=52 PREC=0x20 TTL=111 ID=31083 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-22 18:05:52
222.122.94.18 attackbots
Nov 22 10:58:25 XXX sshd[52788]: Invalid user ofsaa from 222.122.94.18 port 53594
2019-11-22 18:00:47

Recently Reported IPs

132.148.221.142 132.148.221.89 132.148.218.84 132.148.220.205
132.148.22.191 132.148.222.122 132.148.224.156 132.148.226.32
132.148.224.55 132.148.227.251 132.148.228.165 132.148.232.136
132.148.23.81 132.148.231.46 132.148.238.247 132.148.239.102
132.148.233.65 132.148.240.251 132.148.248.194 132.148.248.237