Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.180.67.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.180.67.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:11:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 49.67.180.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.67.180.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.84.212.211 attack
Jul 12 08:11:40 vps200512 sshd\[20343\]: Invalid user rp from 187.84.212.211
Jul 12 08:11:40 vps200512 sshd\[20343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.84.212.211
Jul 12 08:11:42 vps200512 sshd\[20343\]: Failed password for invalid user rp from 187.84.212.211 port 52962 ssh2
Jul 12 08:18:07 vps200512 sshd\[20572\]: Invalid user 13 from 187.84.212.211
Jul 12 08:18:07 vps200512 sshd\[20572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.84.212.211
2019-07-12 20:41:34
149.202.45.205 attack
Jul 12 14:22:37 meumeu sshd[32310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205 
Jul 12 14:22:39 meumeu sshd[32310]: Failed password for invalid user noah from 149.202.45.205 port 38550 ssh2
Jul 12 14:26:54 meumeu sshd[632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.45.205 
...
2019-07-12 20:27:42
90.89.20.230 attack
12.07.2019 12:40:03 SSH access blocked by firewall
2019-07-12 20:43:53
112.27.130.127 attackbots
Autoban   112.27.130.127 ABORTED AUTH
2019-07-12 20:57:43
121.152.221.178 attackspam
2019-07-12T19:48:51.826517enmeeting.mahidol.ac.th sshd\[5406\]: Invalid user testing from 121.152.221.178 port 51948
2019-07-12T19:48:51.840643enmeeting.mahidol.ac.th sshd\[5406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.221.178
2019-07-12T19:48:54.235643enmeeting.mahidol.ac.th sshd\[5406\]: Failed password for invalid user testing from 121.152.221.178 port 51948 ssh2
...
2019-07-12 20:49:37
103.110.56.82 attackspam
WordPress brute force
2019-07-12 20:35:12
165.227.69.39 attackbots
Jul 12 15:05:17 vps647732 sshd[17599]: Failed password for ubuntu from 165.227.69.39 port 55590 ssh2
...
2019-07-12 21:12:27
31.192.108.111 attackspambots
3389BruteforceIDS
2019-07-12 20:45:51
27.194.94.134 attack
23/tcp
[2019-07-12]1pkt
2019-07-12 20:55:07
188.166.172.189 attackspam
Jul 12 14:50:27 MK-Soft-Root1 sshd\[13205\]: Invalid user ob from 188.166.172.189 port 51437
Jul 12 14:50:27 MK-Soft-Root1 sshd\[13205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.172.189
Jul 12 14:50:30 MK-Soft-Root1 sshd\[13205\]: Failed password for invalid user ob from 188.166.172.189 port 51437 ssh2
...
2019-07-12 21:01:02
207.46.13.215 attackbotsspam
Jul 12 09:43:39   TCP Attack: SRC=207.46.13.215 DST=[Masked] LEN=291 TOS=0x00 PREC=0x00 TTL=102  DF PROTO=TCP SPT=3788 DPT=80 WINDOW=64240 RES=0x00 ACK PSH URGP=0
2019-07-12 20:32:47
106.13.127.210 attackbotsspam
Jul 12 12:00:54 MK-Soft-VM4 sshd\[15738\]: Invalid user pavbras from 106.13.127.210 port 54746
Jul 12 12:00:54 MK-Soft-VM4 sshd\[15738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.127.210
Jul 12 12:00:56 MK-Soft-VM4 sshd\[15738\]: Failed password for invalid user pavbras from 106.13.127.210 port 54746 ssh2
...
2019-07-12 21:02:25
218.106.121.18 attack
20 attempts against mh-ssh on milky.magehost.pro
2019-07-12 21:07:25
188.75.179.90 attackspam
Brute force attempt
2019-07-12 20:51:12
200.58.219.218 attack
Jul 12 05:37:26 vps200512 sshd\[15014\]: Invalid user tester from 200.58.219.218
Jul 12 05:37:26 vps200512 sshd\[15014\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218
Jul 12 05:37:29 vps200512 sshd\[15014\]: Failed password for invalid user tester from 200.58.219.218 port 57886 ssh2
Jul 12 05:42:48 vps200512 sshd\[15224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218  user=sshd
Jul 12 05:42:50 vps200512 sshd\[15224\]: Failed password for sshd from 200.58.219.218 port 59102 ssh2
2019-07-12 21:09:03

Recently Reported IPs

89.243.117.37 223.4.110.169 250.55.93.58 69.64.3.155
150.11.17.139 28.40.38.204 128.169.125.217 86.249.129.12
115.147.54.73 124.212.78.196 238.145.181.229 175.120.117.19
56.223.166.250 92.119.15.100 119.156.104.3 148.205.52.176
91.145.253.207 155.170.84.156 98.64.59.222 178.202.225.216