Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.150.244.170
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.150.244.170.		IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060601 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 07 07:52:13 CST 2024
;; MSG SIZE  rcvd: 108
Host info
Host 170.244.150.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 170.244.150.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.236.37.116 attackbotsspam
SSH invalid-user multiple login attempts
2019-07-08 16:55:51
170.244.212.162 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 16:41:32
191.53.251.214 attack
Brute force attack stopped by firewall
2019-07-08 16:26:21
113.177.134.201 attack
Automatic report - SSH Brute-Force Attack
2019-07-08 16:36:25
164.132.122.244 attackspambots
WordPress login Brute force / Web App Attack on client site.
2019-07-08 16:49:13
46.105.99.163 attackbotsspam
Automatic report - Web App Attack
2019-07-08 16:47:42
148.70.63.163 attackbotsspam
Jul  8 03:21:34 aat-srv002 sshd[3235]: Failed password for root from 148.70.63.163 port 37586 ssh2
Jul  8 03:26:06 aat-srv002 sshd[3282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
Jul  8 03:26:08 aat-srv002 sshd[3282]: Failed password for invalid user sirene from 148.70.63.163 port 43970 ssh2
...
2019-07-08 16:51:43
159.65.8.65 attackbots
Jul  8 10:07:41 rb06 sshd[12994]: Failed password for invalid user peter from 159.65.8.65 port 58280 ssh2
Jul  8 10:07:42 rb06 sshd[12994]: Received disconnect from 159.65.8.65: 11: Bye Bye [preauth]
Jul  8 10:11:12 rb06 sshd[12838]: Failed password for invalid user em3-user from 159.65.8.65 port 35388 ssh2
Jul  8 10:11:12 rb06 sshd[12838]: Received disconnect from 159.65.8.65: 11: Bye Bye [preauth]
Jul  8 10:13:21 rb06 sshd[18344]: Failed password for invalid user system from 159.65.8.65 port 52628 ssh2
Jul  8 10:13:21 rb06 sshd[18344]: Received disconnect from 159.65.8.65: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.65.8.65
2019-07-08 16:50:44
177.11.191.244 attack
Brute force attack stopped by firewall
2019-07-08 16:28:11
187.120.141.73 attackbots
Brute force attack stopped by firewall
2019-07-08 16:26:44
121.190.21.41 attackspam
Unauthorised access (Jul  8) SRC=121.190.21.41 LEN=40 TTL=243 ID=16087 DF TCP DPT=23 WINDOW=14600 SYN
2019-07-08 16:54:26
170.239.43.108 attackbotsspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 16:52:16
191.53.116.6 attackspam
Brute force attack stopped by firewall
2019-07-08 16:18:42
119.93.23.22 attack
Automatic report - SSH Brute-Force Attack
2019-07-08 16:41:51
181.143.183.44 attackspam
10 attempts against mh-pma-try-ban on seed.magehost.pro
2019-07-08 16:59:22

Recently Reported IPs

145.158.166.3 108.232.181.44 246.2.18.80 84.242.190.54
230.98.86.107 208.58.175.231 229.173.65.123 83.220.19.34
15.22.172.252 79.177.179.195 103.250.58.39 29.197.247.221
233.6.1.97 115.163.190.122 132.35.24.201 42.11.72.127
52.104.234.21 160.69.158.16 117.25.122.235 243.169.69.193