Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Peru

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
132.157.66.141 attack
22/tcp 8291/tcp...
[2020-10-02]4pkt,2pt.(tcp)
2020-10-04 08:57:52
132.157.66.141 attackspam
22/tcp 8291/tcp...
[2020-10-02]4pkt,2pt.(tcp)
2020-10-03 17:18:09
132.157.66.89 attack
Unauthorized connection attempt from IP address 132.157.66.89 on Port 445(SMB)
2020-09-06 03:42:24
132.157.66.89 attack
Unauthorized connection attempt from IP address 132.157.66.89 on Port 445(SMB)
2020-09-05 19:21:59
132.157.66.17 attackbotsspam
2019-09-23 14:53:02 1iCNps-0001wU-1U SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:59691 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 14:53:22 1iCNqC-0001x2-Eo SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:60373 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 14:53:31 1iCNqM-0001xC-Oz SMTP connection from \(\[132.157.66.17\]\) \[132.157.66.17\]:60676 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 04:19:40
132.157.66.192 attackspam
2019-03-11 17:23:17 H=\(\[132.157.66.192\]\) \[132.157.66.192\]:6022 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:23:23 H=\(\[132.157.66.192\]\) \[132.157.66.192\]:6337 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 17:23:30 H=\(\[132.157.66.192\]\) \[132.157.66.192\]:6663 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 04:15:25
132.157.66.25 attackbotsspam
2019-06-22 21:01:01 1helFy-0004wE-Vo SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:39256 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 21:01:11 1helG8-0004wT-1q SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:39749 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-06-22 21:01:21 1helGH-0004wa-23 SMTP connection from \(\[132.157.66.25\]\) \[132.157.66.25\]:40145 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 04:13:08
132.157.66.66 attackbotsspam
2019-07-06 04:17:19 1hjaGI-0000ta-8S SMTP connection from \(\[132.157.66.66\]\) \[132.157.66.66\]:29139 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 04:17:39 1hjaGb-0000tt-UP SMTP connection from \(\[132.157.66.66\]\) \[132.157.66.66\]:29886 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-06 04:17:58 1hjaGx-0000uF-Bn SMTP connection from \(\[132.157.66.66\]\) \[132.157.66.66\]:31003 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 04:10:58
132.157.66.231 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 21-10-2019 21:05:22.
2019-10-22 05:32:08
132.157.66.139 attackbots
IP: 132.157.66.139
ASN: AS21575 ENTEL PERU S.A.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 28/07/2019 1:13:39 AM UTC
2019-07-28 11:34:09
132.157.66.172 attackspam
IP: 132.157.66.172
ASN: AS21575 ENTEL PERU S.A.
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 28/07/2019 1:13:40 AM UTC
2019-07-28 11:32:37
132.157.66.186 attackbots
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (1020)
2019-07-24 09:44:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.157.66.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43295
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.157.66.200.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 144 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:43:38 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 200.66.157.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.66.157.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.70.30 attackbotsspam
Mar 24 16:27:11 firewall sshd[5246]: Invalid user jami from 51.75.70.30
Mar 24 16:27:13 firewall sshd[5246]: Failed password for invalid user jami from 51.75.70.30 port 46996 ssh2
Mar 24 16:34:42 firewall sshd[6679]: Invalid user info from 51.75.70.30
...
2020-03-25 09:06:45
220.120.106.254 attackspambots
Mar 24 19:18:37 meumeu sshd[390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 
Mar 24 19:18:39 meumeu sshd[390]: Failed password for invalid user kendrah from 220.120.106.254 port 33516 ssh2
Mar 24 19:22:37 meumeu sshd[876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.120.106.254 
...
2020-03-25 09:07:02
163.172.19.244 attackspambots
Unauthorized connection attempt detected, IP banned.
2020-03-25 09:10:32
49.72.210.234 attackbotsspam
Mar 24 02:12:23 w sshd[29788]: Did not receive identification string from 49.72.210.234
Mar 24 02:15:03 w sshd[29917]: reveeclipse mapping checking getaddrinfo for 234.210.72.49.broad.sz.js.dynamic.163data.com.cn [49.72.210.234] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 24 02:15:03 w sshd[29917]: Invalid user clinton from 49.72.210.234
Mar 24 02:15:03 w sshd[29917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.72.210.234 
Mar 24 02:15:05 w sshd[29917]: Failed password for invalid user clinton from 49.72.210.234 port 59856 ssh2
Mar 24 02:15:05 w sshd[29917]: Received disconnect from 49.72.210.234: 11: Bye Bye [preauth]
Mar 24 02:17:41 w sshd[29957]: reveeclipse mapping checking getaddrinfo for 234.210.72.49.broad.sz.js.dynamic.163data.com.cn [49.72.210.234] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 24 02:17:41 w sshd[29957]: Invalid user tonya from 49.72.210.234
Mar 24 02:17:41 w sshd[29957]: pam_unix(sshd:auth): authentication f........
-------------------------------
2020-03-25 09:22:39
121.33.250.41 attackbotsspam
Invalid user alan from 121.33.250.41 port 37256
2020-03-25 09:27:26
164.132.192.5 attack
2020-03-24T23:12:42.821961abusebot.cloudsearch.cf sshd[600]: Invalid user gj from 164.132.192.5 port 41020
2020-03-24T23:12:42.831661abusebot.cloudsearch.cf sshd[600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.ip-164-132-192.eu
2020-03-24T23:12:42.821961abusebot.cloudsearch.cf sshd[600]: Invalid user gj from 164.132.192.5 port 41020
2020-03-24T23:12:44.949584abusebot.cloudsearch.cf sshd[600]: Failed password for invalid user gj from 164.132.192.5 port 41020 ssh2
2020-03-24T23:19:24.359108abusebot.cloudsearch.cf sshd[1252]: Invalid user fauzi from 164.132.192.5 port 36836
2020-03-24T23:19:24.365133abusebot.cloudsearch.cf sshd[1252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.ip-164-132-192.eu
2020-03-24T23:19:24.359108abusebot.cloudsearch.cf sshd[1252]: Invalid user fauzi from 164.132.192.5 port 36836
2020-03-24T23:19:25.998665abusebot.cloudsearch.cf sshd[1252]: Failed password for invalid use
...
2020-03-25 09:03:59
122.114.239.229 attackspambots
Invalid user divya from 122.114.239.229 port 40632
2020-03-25 09:26:31
157.230.242.76 attackbots
Auto reported by IDS
2020-03-25 09:08:25
195.222.163.54 attackbots
Mar 25 01:03:36 serwer sshd\[24497\]: Invalid user rheanne from 195.222.163.54 port 36396
Mar 25 01:03:36 serwer sshd\[24497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.222.163.54
Mar 25 01:03:37 serwer sshd\[24497\]: Failed password for invalid user rheanne from 195.222.163.54 port 36396 ssh2
...
2020-03-25 08:57:34
197.41.6.194 attackspambots
port scan and connect, tcp 23 (telnet)
2020-03-25 09:35:24
202.152.1.67 attack
web-1 [ssh] SSH Attack
2020-03-25 09:31:30
82.251.161.207 attack
Mar 25 00:23:37 combo sshd[886]: Invalid user ld from 82.251.161.207 port 51154
Mar 25 00:23:39 combo sshd[886]: Failed password for invalid user ld from 82.251.161.207 port 51154 ssh2
Mar 25 00:28:04 combo sshd[1265]: Invalid user yd from 82.251.161.207 port 52854
...
2020-03-25 08:51:55
222.173.12.35 attack
SSH-BruteForce
2020-03-25 09:09:25
103.5.150.16 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-03-25 09:06:02
138.197.175.236 attackbotsspam
Mar 25 01:52:46 ewelt sshd[19243]: Invalid user www from 138.197.175.236 port 49582
Mar 25 01:52:46 ewelt sshd[19243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.175.236
Mar 25 01:52:46 ewelt sshd[19243]: Invalid user www from 138.197.175.236 port 49582
Mar 25 01:52:48 ewelt sshd[19243]: Failed password for invalid user www from 138.197.175.236 port 49582 ssh2
...
2020-03-25 09:18:50

Recently Reported IPs

42.233.182.197 120.227.42.206 220.94.104.198 222.138.102.181
106.225.229.28 180.245.91.232 203.189.118.81 183.4.2.56
41.92.30.50 190.94.138.219 189.213.45.198 156.215.53.145
194.247.17.83 217.113.3.2 49.37.67.132 192.121.102.97
45.90.61.147 201.156.123.63 188.162.199.85 54.174.185.86