Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.149.94.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.149.94.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 17:59:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 121.94.149.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.94.149.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
71.6.233.185 attackspam
2004/tcp 49152/tcp 1024/tcp...
[2019-07-13/08-23]4pkt,4pt.(tcp)
2019-08-24 05:50:16
209.17.96.218 attackbotsspam
Unauthorised access (Aug 23) SRC=209.17.96.218 LEN=44 TOS=0x08 PREC=0x20 TTL=243 ID=54321 TCP DPT=8080 WINDOW=65535 SYN
2019-08-24 06:13:47
200.70.56.204 attack
Aug 23 23:21:10 root sshd[16581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204 
Aug 23 23:21:11 root sshd[16581]: Failed password for invalid user cyrus from 200.70.56.204 port 36916 ssh2
Aug 23 23:28:03 root sshd[16665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.204 
...
2019-08-24 06:07:03
107.170.124.97 attackspambots
Aug 24 00:31:39 srv-4 sshd\[12410\]: Invalid user chong from 107.170.124.97
Aug 24 00:31:39 srv-4 sshd\[12410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.124.97
Aug 24 00:31:41 srv-4 sshd\[12410\]: Failed password for invalid user chong from 107.170.124.97 port 35895 ssh2
...
2019-08-24 06:02:46
46.135.43.229 attack
2019-08-23 16:59:47 H=cst-prg-43-229.cust.vodafone.cz [46.135.43.229]:63091 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=46.135.43.229)
2019-08-23 16:59:47 unexpected disconnection while reading SMTP command from cst-prg-43-229.cust.vodafone.cz [46.135.43.229]:63091 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-08-23 17:25:58 H=cst-prg-43-229.cust.vodafone.cz [46.135.43.229]:56951 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=46.135.43.229)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.135.43.229
2019-08-24 06:10:23
222.124.16.227 attackbotsspam
Aug 24 00:20:20 dev0-dcde-rnet sshd[10070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
Aug 24 00:20:22 dev0-dcde-rnet sshd[10070]: Failed password for invalid user joeflores from 222.124.16.227 port 52854 ssh2
Aug 24 00:25:31 dev0-dcde-rnet sshd[10093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.124.16.227
2019-08-24 06:31:29
190.119.190.122 attack
2019-08-23T21:56:40.254120abusebot-8.cloudsearch.cf sshd\[9278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.119.190.122  user=root
2019-08-24 06:21:17
54.38.243.133 attackbotsspam
Aug 23 11:40:43 friendsofhawaii sshd\[23858\]: Invalid user jason from 54.38.243.133
Aug 23 11:40:43 friendsofhawaii sshd\[23858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-54-38-243.eu
Aug 23 11:40:45 friendsofhawaii sshd\[23858\]: Failed password for invalid user jason from 54.38.243.133 port 52826 ssh2
Aug 23 11:44:47 friendsofhawaii sshd\[24160\]: Invalid user recruit from 54.38.243.133
Aug 23 11:44:47 friendsofhawaii sshd\[24160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.ip-54-38-243.eu
2019-08-24 05:53:33
188.165.211.99 attack
Aug 23 20:01:37 SilenceServices sshd[6077]: Failed password for sinusbot from 188.165.211.99 port 40854 ssh2
Aug 23 20:04:22 SilenceServices sshd[8371]: Failed password for sinusbot from 188.165.211.99 port 35226 ssh2
2019-08-24 06:30:14
193.70.87.215 attack
Aug 23 22:34:19 tux-35-217 sshd\[7121\]: Invalid user ts3sleep from 193.70.87.215 port 59089
Aug 23 22:34:19 tux-35-217 sshd\[7121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.87.215
Aug 23 22:34:21 tux-35-217 sshd\[7121\]: Failed password for invalid user ts3sleep from 193.70.87.215 port 59089 ssh2
Aug 23 22:38:17 tux-35-217 sshd\[7160\]: Invalid user user from 193.70.87.215 port 53847
Aug 23 22:38:17 tux-35-217 sshd\[7160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.87.215
...
2019-08-24 06:15:37
189.125.234.194 attack
189.125.234.194 - - [23/Aug/2019:22:38:25 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
189.125.234.194 - - [23/Aug/2019:22:38:30 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
189.125.234.194 - - [23/Aug/2019:22:38:34 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
189.125.234.194 - - [23/Aug/2019:22:38:37 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
189.125.234.194 - - [23/Aug/2019:22:38:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
189.125.234.194 - - [23/Aug/2019:22:38:46 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-08-24 06:24:59
220.176.204.91 attack
Aug 23 07:00:49 kapalua sshd\[11734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91  user=root
Aug 23 07:00:50 kapalua sshd\[11734\]: Failed password for root from 220.176.204.91 port 35769 ssh2
Aug 23 07:05:55 kapalua sshd\[12191\]: Invalid user vmail from 220.176.204.91
Aug 23 07:05:55 kapalua sshd\[12191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
Aug 23 07:05:57 kapalua sshd\[12191\]: Failed password for invalid user vmail from 220.176.204.91 port 53213 ssh2
2019-08-24 06:19:51
123.201.158.194 attackbotsspam
Aug 23 23:39:53 icinga sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.158.194
Aug 23 23:39:55 icinga sshd[9193]: Failed password for invalid user support from 123.201.158.194 port 55236 ssh2
...
2019-08-24 06:11:23
13.57.201.35 attackbotsspam
Aug 23 21:48:45 MK-Soft-VM3 sshd\[1996\]: Invalid user neil from 13.57.201.35 port 41304
Aug 23 21:48:45 MK-Soft-VM3 sshd\[1996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.57.201.35
Aug 23 21:48:47 MK-Soft-VM3 sshd\[1996\]: Failed password for invalid user neil from 13.57.201.35 port 41304 ssh2
...
2019-08-24 06:06:26
152.136.125.210 attackbots
Invalid user hadoop from 152.136.125.210 port 49792
2019-08-24 06:05:30

Recently Reported IPs

203.216.101.170 198.65.9.129 143.225.127.138 118.250.184.168
252.110.109.104 64.66.38.57 189.135.65.215 70.152.249.106
124.160.185.10 127.209.90.47 33.165.119.99 77.193.102.100
92.168.134.197 238.147.86.164 133.243.229.180 173.147.62.153
21.4.156.239 213.32.210.230 134.69.93.76 123.128.197.164