Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.4.48.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.4.48.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062701 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 02:09:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 49.48.4.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.4.48.49.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
219.137.61.239 attackbots
2375/tcp
[2019-07-19]1pkt
2019-07-20 04:32:30
190.40.64.194 attackspambots
Jul 19 13:24:31 plusreed sshd[26215]: Invalid user wi from 190.40.64.194
...
2019-07-20 04:00:55
105.96.83.152 attack
445/tcp
[2019-07-19]1pkt
2019-07-20 04:15:16
211.181.237.132 attack
445/tcp
[2019-07-19]1pkt
2019-07-20 04:16:57
222.136.136.183 attackbotsspam
Jul 18 19:34:11 localhost kernel: [14737044.814497] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=222.136.136.183 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=4190 PROTO=TCP SPT=29736 DPT=52869 WINDOW=27139 RES=0x00 SYN URGP=0 
Jul 18 19:34:11 localhost kernel: [14737044.814519] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=222.136.136.183 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=4190 PROTO=TCP SPT=29736 DPT=52869 SEQ=758669438 ACK=0 WINDOW=27139 RES=0x00 SYN URGP=0 
Jul 19 12:42:31 localhost kernel: [14798744.930099] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=222.136.136.183 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=48963 PROTO=TCP SPT=23584 DPT=52869 WINDOW=27139 RES=0x00 SYN URGP=0 
Jul 19 12:42:31 localhost kernel: [14798744.930125] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=222.136.136.183 DST=[mungedIP2] LEN=40 T
2019-07-20 04:24:44
35.198.225.108 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-07-20 03:56:00
90.110.39.8 attackspambots
Jul 19 21:28:41 rpi sshd[31544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.110.39.8 
Jul 19 21:28:42 rpi sshd[31544]: Failed password for invalid user password from 90.110.39.8 port 59542 ssh2
2019-07-20 04:20:17
67.162.19.230 attackspam
Jul 20 01:13:26 areeb-Workstation sshd\[31452\]: Invalid user web from 67.162.19.230
Jul 20 01:13:26 areeb-Workstation sshd\[31452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.162.19.230
Jul 20 01:13:28 areeb-Workstation sshd\[31452\]: Failed password for invalid user web from 67.162.19.230 port 44422 ssh2
...
2019-07-20 04:12:18
150.66.1.167 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.66.1.167  user=root
Failed password for root from 150.66.1.167 port 58050 ssh2
Invalid user yao from 150.66.1.167 port 56326
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.66.1.167
Failed password for invalid user yao from 150.66.1.167 port 56326 ssh2
2019-07-20 04:12:04
41.138.32.182 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-20 04:33:18
91.206.15.248 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-20 03:47:50
217.212.198.41 attackspambots
Honeypot attack, port: 5555, PTR: 217-212-198-41-no2300.tbcn.telia.com.
2019-07-20 04:11:29
181.120.219.187 attack
2019-07-19T19:48:12.830036abusebot-6.cloudsearch.cf sshd\[15680\]: Invalid user ircd from 181.120.219.187 port 52678
2019-07-20 04:13:10
120.14.41.72 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-20 04:13:57
185.94.111.1 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-20 03:54:42

Recently Reported IPs

133.6.172.118 133.34.86.124 136.219.96.140 133.187.44.148
131.37.39.180 132.103.72.60 131.230.71.171 13.71.90.125
13.223.30.107 13.160.103.240 127.172.159.132 132.83.240.170
129.57.184.28 129.158.242.160 127.39.231.129 126.94.155.236
126.59.160.70 127.77.72.164 126.206.5.12 13.102.140.235