Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.186.13.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1934
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;132.186.13.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062600 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 26 15:27:39 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 48.13.186.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.13.186.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.188.42.130 attackbotsspam
Dec 14 11:30:19 ncomp sshd[7322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.188.42.130  user=root
Dec 14 11:30:21 ncomp sshd[7322]: Failed password for root from 196.188.42.130 port 46812 ssh2
Dec 14 11:43:08 ncomp sshd[7570]: Invalid user janhenrik from 196.188.42.130
2019-12-14 19:55:31
139.198.189.36 attack
--- report ---
Dec 14 07:13:15 sshd: Connection from 139.198.189.36 port 40850
Dec 14 07:13:17 sshd: Invalid user admin from 139.198.189.36
Dec 14 07:13:17 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.189.36
Dec 14 07:13:19 sshd: Failed password for invalid user admin from 139.198.189.36 port 40850 ssh2
Dec 14 07:13:19 sshd: Received disconnect from 139.198.189.36: 11: Bye Bye [preauth]
2019-12-14 19:53:11
92.119.160.52 attack
firewall-block, port(s): 3389/tcp, 48003/tcp, 50519/tcp, 51705/tcp, 52172/tcp, 53150/tcp, 61024/tcp
2019-12-14 19:45:28
221.132.85.120 attack
Dec 14 12:01:38 server sshd\[32710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.85.120  user=mysql
Dec 14 12:01:40 server sshd\[32710\]: Failed password for mysql from 221.132.85.120 port 53506 ssh2
Dec 14 12:11:02 server sshd\[3033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.85.120  user=root
Dec 14 12:11:04 server sshd\[3033\]: Failed password for root from 221.132.85.120 port 39694 ssh2
Dec 14 12:17:07 server sshd\[4800\]: Invalid user wkiconsole from 221.132.85.120
Dec 14 12:17:07 server sshd\[4800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.85.120 
...
2019-12-14 19:55:57
200.60.91.42 attackbots
Dec 14 01:50:30 php1 sshd\[21159\]: Invalid user staton from 200.60.91.42
Dec 14 01:50:30 php1 sshd\[21159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.91.42
Dec 14 01:50:32 php1 sshd\[21159\]: Failed password for invalid user staton from 200.60.91.42 port 41068 ssh2
Dec 14 01:56:57 php1 sshd\[21966\]: Invalid user admin from 200.60.91.42
Dec 14 01:56:57 php1 sshd\[21966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.91.42
2019-12-14 20:07:46
104.236.230.165 attackbotsspam
Dec 14 10:24:31 ns3042688 sshd\[27074\]: Invalid user smmsp from 104.236.230.165
Dec 14 10:24:31 ns3042688 sshd\[27074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165 
Dec 14 10:24:34 ns3042688 sshd\[27074\]: Failed password for invalid user smmsp from 104.236.230.165 port 38227 ssh2
Dec 14 10:29:35 ns3042688 sshd\[28721\]: Invalid user guest from 104.236.230.165
Dec 14 10:29:35 ns3042688 sshd\[28721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165 
...
2019-12-14 20:09:03
122.3.174.77 attackspambots
Unauthorized connection attempt detected from IP address 122.3.174.77 to port 445
2019-12-14 20:15:49
185.176.27.38 attack
12/14/2019-05:34:29.330632 185.176.27.38 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-14 19:51:23
54.39.51.31 attackbotsspam
Dec 13 22:25:36 auw2 sshd\[28942\]: Invalid user clipsy from 54.39.51.31
Dec 13 22:25:36 auw2 sshd\[28942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns559310.ip-54-39-51.net
Dec 13 22:25:38 auw2 sshd\[28942\]: Failed password for invalid user clipsy from 54.39.51.31 port 60224 ssh2
Dec 13 22:31:03 auw2 sshd\[29451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns559310.ip-54-39-51.net  user=root
Dec 13 22:31:05 auw2 sshd\[29451\]: Failed password for root from 54.39.51.31 port 40068 ssh2
2019-12-14 20:10:17
76.186.81.229 attack
Dec 14 01:24:00 TORMINT sshd\[8694\]: Invalid user award from 76.186.81.229
Dec 14 01:24:00 TORMINT sshd\[8694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.81.229
Dec 14 01:24:02 TORMINT sshd\[8694\]: Failed password for invalid user award from 76.186.81.229 port 41553 ssh2
...
2019-12-14 20:18:23
146.115.62.55 attackbots
Dec 14 12:49:51 sso sshd[6049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.115.62.55
Dec 14 12:49:53 sso sshd[6049]: Failed password for invalid user aurelie from 146.115.62.55 port 49906 ssh2
...
2019-12-14 20:14:44
185.14.148.75 attack
email spam
2019-12-14 20:16:19
150.129.131.178 attack
Unauthorized connection attempt detected from IP address 150.129.131.178 to port 445
2019-12-14 20:07:09
175.207.13.200 attackspambots
Dec 14 09:41:25 localhost sshd\[15501\]: Invalid user sirg from 175.207.13.200 port 47332
Dec 14 09:41:25 localhost sshd\[15501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.13.200
Dec 14 09:41:27 localhost sshd\[15501\]: Failed password for invalid user sirg from 175.207.13.200 port 47332 ssh2
2019-12-14 19:51:37
122.51.222.18 attackbotsspam
Dec 14 04:40:57 TORMINT sshd\[19448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.222.18  user=root
Dec 14 04:40:59 TORMINT sshd\[19448\]: Failed password for root from 122.51.222.18 port 49222 ssh2
Dec 14 04:49:31 TORMINT sshd\[19787\]: Invalid user masayoshi from 122.51.222.18
Dec 14 04:49:31 TORMINT sshd\[19787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.222.18
...
2019-12-14 19:47:36

Recently Reported IPs

19.93.216.67 100.116.141.58 127.112.204.34 52.64.14.242
15.172.115.75 181.107.86.150 206.215.93.182 128.89.58.72
182.232.175.58 136.181.215.215 2600:1f18:65b9:df01:c417:9603:44a:5a81 213.113.57.32
37.75.171.17 3.243.67.42 142.77.246.110 147.148.177.121
87.42.148.115 115.127.36.171 101.131.228.136 156.77.43.83