Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.180.229.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10118
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.180.229.137.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 174 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:18:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
137.229.180.132.in-addr.arpa domain name pointer bt-nac-5137.nac.uni-bayreuth.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.229.180.132.in-addr.arpa	name = bt-nac-5137.nac.uni-bayreuth.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.39.174 attackbots
2019-07-16T14:09:37.839774abusebot-4.cloudsearch.cf sshd\[29696\]: Invalid user guest from 139.59.39.174 port 40138
2019-07-16 22:16:19
61.147.61.86 attackbots
abuse-sasl
2019-07-16 22:24:56
221.160.100.14 attackspambots
Jul 16 15:53:11 vps647732 sshd[6310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14
Jul 16 15:53:13 vps647732 sshd[6310]: Failed password for invalid user florin from 221.160.100.14 port 45080 ssh2
...
2019-07-16 22:22:09
73.164.224.145 attackspam
Unauthorised access (Jul 16) SRC=73.164.224.145 LEN=40 PREC=0x20 TTL=232 ID=51983 DF TCP DPT=23 WINDOW=14600 SYN
2019-07-16 22:27:55
182.122.158.151 attack
firewall-block, port(s): 23/tcp
2019-07-16 23:10:18
185.211.245.170 attackbots
Jul 16 16:18:53 relay postfix/smtpd\[14598\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 16:19:07 relay postfix/smtpd\[14795\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 16:19:57 relay postfix/smtpd\[13899\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 16:20:05 relay postfix/smtpd\[14598\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 16:20:33 relay postfix/smtpd\[14598\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-16 22:44:17
121.141.5.199 attack
web-1 [ssh_2] SSH Attack
2019-07-16 22:36:10
112.167.53.215 attack
Jul 16 16:41:16 localhost sshd\[32342\]: Invalid user toor from 112.167.53.215 port 47676
Jul 16 16:41:16 localhost sshd\[32342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.167.53.215
Jul 16 16:41:18 localhost sshd\[32342\]: Failed password for invalid user toor from 112.167.53.215 port 47676 ssh2
2019-07-16 22:50:38
203.195.170.66 attackspambots
Automatic report generated by Wazuh
2019-07-16 22:19:52
77.55.216.98 attack
Jul 16 15:02:41 dedicated sshd[6089]: Invalid user jasper from 77.55.216.98 port 45988
2019-07-16 22:57:13
61.173.150.130 attack
abuse-sasl
2019-07-16 22:07:59
112.166.68.193 attackspam
Jul 16 15:58:19 vps647732 sshd[6367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.68.193
Jul 16 15:58:21 vps647732 sshd[6367]: Failed password for invalid user dima from 112.166.68.193 port 42288 ssh2
...
2019-07-16 22:10:52
190.112.224.132 attackspam
firewall-block, port(s): 445/tcp
2019-07-16 23:03:48
47.95.195.212 attackbots
Automatic report - Banned IP Access
2019-07-16 22:20:54
58.217.77.95 attackbots
Jul 16 06:42:40 eola postfix/smtpd[31992]: connect from unknown[58.217.77.95]
Jul 16 06:42:40 eola postfix/smtpd[31992]: NOQUEUE: reject: RCPT from unknown[58.217.77.95]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Jul 16 06:42:41 eola postfix/smtpd[31992]: disconnect from unknown[58.217.77.95] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Jul 16 06:42:42 eola postfix/smtpd[31992]: connect from unknown[58.217.77.95]
Jul 16 06:42:44 eola postfix/smtpd[31992]: lost connection after AUTH from unknown[58.217.77.95]
Jul 16 06:42:44 eola postfix/smtpd[31992]: disconnect from unknown[58.217.77.95] ehlo=1 auth=0/1 commands=1/2
Jul 16 06:42:44 eola postfix/smtpd[31992]: connect from unknown[58.217.77.95]
Jul 16 06:42:45 eola postfix/smtpd[31992]: lost connection after AUTH from unknown[58.217.77.95]
Jul 16 06:42:45 eola postfix/smtpd[31992]: disconnect from unknown[58.217.77.95] ehlo=1 auth=0/1 commands=1/2
Jul 16 06:42:45 eol........
-------------------------------
2019-07-16 23:12:38

Recently Reported IPs

83.73.183.43 160.82.89.171 205.192.255.132 205.66.135.1
22.119.148.107 174.59.127.107 218.110.64.144 243.7.25.225
177.114.30.138 21.73.155.205 216.185.11.148 255.178.97.163
206.79.124.168 4.189.36.93 250.124.15.107 87.58.78.102
234.34.98.168 50.210.181.24 106.236.132.198 231.55.33.88