Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.180.148.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2434
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.180.148.171.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 13 16:04:30 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 171.148.180.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 171.148.180.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
50.198.17.186 attackbots
Telnet brute force
2019-08-01 22:17:02
78.133.136.142 attackbotsspam
Aug  1 15:26:37 lnxmail61 sshd[8154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.133.136.142
2019-08-01 22:15:57
187.85.210.47 attackbotsspam
$f2bV_matches
2019-08-01 21:25:16
178.62.108.111 attackspambots
Unauthorized SSH login attempts
2019-08-01 21:58:45
54.36.222.37 attackbotsspam
Automatic report - Banned IP Access
2019-08-01 21:52:55
80.14.55.242 attackspam
Unauthorised access (Aug  1) SRC=80.14.55.242 LEN=44 TTL=53 ID=25289 TCP DPT=23 WINDOW=19548 SYN
2019-08-01 21:35:16
220.248.164.65 attackspambots
Aug  1 15:26:55 icinga sshd[26781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.164.65
Aug  1 15:26:57 icinga sshd[26781]: Failed password for invalid user andrei from 220.248.164.65 port 60051 ssh2
...
2019-08-01 22:02:50
162.243.158.185 attackspam
2019-08-01T13:59:51.558197abusebot-8.cloudsearch.cf sshd\[18188\]: Invalid user support from 162.243.158.185 port 35914
2019-08-01 22:10:14
185.222.209.223 attack
21 attempts against mh_ha-misbehave-ban on shade.magehost.pro
2019-08-01 22:08:25
103.107.162.102 attackspambots
Jul 31 19:45:59 our-server-hostname postfix/smtpd[5556]: connect from unknown[103.107.162.102]
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.107.162.102
2019-08-01 22:16:19
68.183.72.245 attack
www.handydirektreparatur.de 68.183.72.245 \[01/Aug/2019:15:26:31 +0200\] "POST /wp-login.php HTTP/1.1" 200 5668 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.handydirektreparatur.de 68.183.72.245 \[01/Aug/2019:15:26:34 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4117 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-01 22:20:45
201.156.218.159 attackspam
Automatic report - Port Scan Attack
2019-08-01 21:42:49
51.68.82.218 attackspambots
Automatic report - Banned IP Access
2019-08-01 22:03:56
91.121.157.83 attackbots
Jul 31 13:12:11 xb0 sshd[17400]: Failed password for invalid user david from 91.121.157.83 port 38128 ssh2
Jul 31 13:12:11 xb0 sshd[17400]: Received disconnect from 91.121.157.83: 11: Bye Bye [preauth]
Jul 31 13:21:36 xb0 sshd[14061]: Failed password for invalid user colleen from 91.121.157.83 port 38176 ssh2
Jul 31 13:21:36 xb0 sshd[14061]: Received disconnect from 91.121.157.83: 11: Bye Bye [preauth]
Jul 31 13:25:49 xb0 sshd[11346]: Failed password for invalid user luciana from 91.121.157.83 port 35444 ssh2
Jul 31 13:25:49 xb0 sshd[11346]: Received disconnect from 91.121.157.83: 11: Bye Bye [preauth]
Jul 31 13:29:52 xb0 sshd[21508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.157.83  user=ntpd
Jul 31 13:29:54 xb0 sshd[21508]: Failed password for ntpd from 91.121.157.83 port 32842 ssh2
Jul 31 13:29:54 xb0 sshd[21508]: Received disconnect from 91.121.157.83: 11: Bye Bye [preauth]
Jul 31 13:34:01 xb0 sshd[20593]: Failed ........
-------------------------------
2019-08-01 22:22:00
103.219.61.3 attack
Aug  1 15:06:27 fr01 sshd[30296]: Invalid user tf2 from 103.219.61.3
Aug  1 15:06:27 fr01 sshd[30296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.61.3
Aug  1 15:06:27 fr01 sshd[30296]: Invalid user tf2 from 103.219.61.3
Aug  1 15:06:29 fr01 sshd[30296]: Failed password for invalid user tf2 from 103.219.61.3 port 37822 ssh2
Aug  1 15:27:09 fr01 sshd[1367]: Invalid user test from 103.219.61.3
...
2019-08-01 21:53:55

Recently Reported IPs

12.130.159.206 250.92.115.117 139.180.2.149 101.251.68.167
101.64.82.57 83.43.6.170 77.172.21.88 58.255.138.81
112.95.8.122 208.18.210.237 241.88.208.176 37.114.141.163
27.18.171.12 13.90.201.117 5.228.196.63 222.78.231.24
222.68.173.10 197.251.252.220 188.121.116.13 180.126.235.178