Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: GoDaddy.com LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
Automatic report - Banned IP Access
2019-12-21 23:48:40
attack
Automatic report - Banned IP Access
2019-07-20 14:16:27
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.148.80.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50671
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.148.80.15.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 20 22:18:44 CST 2019
;; MSG SIZE  rcvd: 117
Host info
15.80.148.132.in-addr.arpa domain name pointer ip-132-148-80-15.ip.secureserver.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
15.80.148.132.in-addr.arpa	name = ip-132-148-80-15.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.28.223.242 attack
Automatic report - XMLRPC Attack
2019-10-17 19:35:23
50.116.81.186 attack
Harmful URL. Webapp attack
2019-10-17 19:35:02
80.82.77.245 attackspam
17.10.2019 11:21:30 Connection to port 1154 blocked by firewall
2019-10-17 19:28:39
122.228.89.67 attackspam
Oct 17 12:53:15 DAAP sshd[20382]: Invalid user 123Spider from 122.228.89.67 port 37975
Oct 17 12:53:15 DAAP sshd[20382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.67
Oct 17 12:53:15 DAAP sshd[20382]: Invalid user 123Spider from 122.228.89.67 port 37975
Oct 17 12:53:17 DAAP sshd[20382]: Failed password for invalid user 123Spider from 122.228.89.67 port 37975 ssh2
...
2019-10-17 19:28:23
222.186.190.2 attackbots
Oct 17 13:03:24 dcd-gentoo sshd[13193]: User root from 222.186.190.2 not allowed because none of user's groups are listed in AllowGroups
Oct 17 13:03:28 dcd-gentoo sshd[13193]: error: PAM: Authentication failure for illegal user root from 222.186.190.2
Oct 17 13:03:24 dcd-gentoo sshd[13193]: User root from 222.186.190.2 not allowed because none of user's groups are listed in AllowGroups
Oct 17 13:03:28 dcd-gentoo sshd[13193]: error: PAM: Authentication failure for illegal user root from 222.186.190.2
Oct 17 13:03:24 dcd-gentoo sshd[13193]: User root from 222.186.190.2 not allowed because none of user's groups are listed in AllowGroups
Oct 17 13:03:28 dcd-gentoo sshd[13193]: error: PAM: Authentication failure for illegal user root from 222.186.190.2
Oct 17 13:03:28 dcd-gentoo sshd[13193]: Failed keyboard-interactive/pam for invalid user root from 222.186.190.2 port 38372 ssh2
...
2019-10-17 19:05:38
223.205.239.136 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:25.
2019-10-17 19:21:58
51.38.232.52 attackspambots
$f2bV_matches
2019-10-17 19:21:29
213.32.71.196 attack
Automatic report - Banned IP Access
2019-10-17 18:58:29
39.109.214.192 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-17 19:32:00
157.230.235.24 attackbots
" "
2019-10-17 19:16:38
94.102.57.31 attackbotsspam
SASL broute force
2019-10-17 18:57:04
182.37.50.38 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:24.
2019-10-17 19:25:21
58.182.240.144 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: 144.240.182.58.starhub.net.sg.
2019-10-17 19:33:34
222.85.111.179 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:25.
2019-10-17 19:22:21
93.125.114.141 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 17-10-2019 04:45:26.
2019-10-17 19:21:12

Recently Reported IPs

185.53.88.15 165.22.126.74 162.190.137.173 119.117.94.148
170.0.124.86 85.23.36.28 139.213.39.105 67.243.37.25
176.164.15.98 112.239.48.200 193.112.128.197 198.39.235.107
146.185.176.87 39.97.69.90 182.161.54.81 78.159.12.132
110.250.118.39 209.181.118.109 138.22.61.138 57.177.245.164