Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.20.126.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15509
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.20.126.1.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 16 18:20:59 CST 2023
;; MSG SIZE  rcvd: 105
Host info
b'Host 1.126.20.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 132.20.126.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.38.33.70 attackbots
Invalid user pilot from 106.38.33.70 port 54118
2020-07-18 23:57:45
93.146.237.163 attack
Jul 18 17:51:36 server sshd[4575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.146.237.163
Jul 18 17:51:38 server sshd[4575]: Failed password for invalid user heim from 93.146.237.163 port 60366 ssh2
Jul 18 17:55:55 server sshd[4818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.146.237.163
...
2020-07-19 00:01:17
97.84.225.94 attackbots
Jul 18 16:42:04 ajax sshd[29080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.84.225.94 
Jul 18 16:42:06 ajax sshd[29080]: Failed password for invalid user minecraft from 97.84.225.94 port 44976 ssh2
2020-07-19 00:00:10
14.204.145.108 attackbotsspam
prod8
...
2020-07-19 00:13:25
191.234.161.50 attack
Jul 18 15:03:36 vps333114 sshd[30582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.234.161.50
Jul 18 15:03:38 vps333114 sshd[30582]: Failed password for invalid user mata from 191.234.161.50 port 55179 ssh2
...
2020-07-19 00:18:56
124.156.102.254 attackspam
Invalid user school from 124.156.102.254 port 57998
2020-07-18 23:53:47
122.51.37.26 attackbots
2020-07-18T16:08:36+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-18 23:54:14
178.128.144.14 attack
Bruteforce detected by fail2ban
2020-07-19 00:26:14
1.20.200.210 attackspam
Invalid user user from 1.20.200.210 port 56474
2020-07-19 00:13:47
106.75.110.232 attack
$f2bV_matches
2020-07-18 23:57:25
46.101.40.21 attack
 TCP (SYN) 46.101.40.21:48645 -> port 32379, len 44
2020-07-19 00:09:44
210.105.148.87 attackbots
Unauthorized connection attempt detected from IP address 210.105.148.87 to port 22
2020-07-19 00:15:56
104.131.157.96 attack
$f2bV_matches
2020-07-18 23:59:00
176.213.142.75 attack
Invalid user alice from 176.213.142.75 port 34018
2020-07-19 00:26:46
122.176.55.10 attack
Invalid user majid from 122.176.55.10 port 64466
2020-07-19 00:33:55

Recently Reported IPs

142.254.101.191 131.163.235.191 120.132.84.12 117.243.148.89
102.175.188.159 249.116.150.10 0.242.227.251 23.234.151.101
46.157.154.21 45.223.234.114 41.215.52.131 31.129.163.255
27.56.148.163 248.243.127.168 241.172.8.72 115.42.77.232
23.103.71.132 22.71.220.126 219.37.173.98 210.190.28.52