Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.42.118.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.42.118.62.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 18:52:17 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 62.118.42.132.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 132.42.118.62.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
125.212.182.44 attackbotsspam
445/tcp 445/tcp
[2019-07-20]2pkt
2019-07-20 21:23:08
193.112.223.243 attack
Auto reported by IDS
2019-07-20 21:33:43
196.195.14.59 attackspambots
Jul 20 05:40:29 mail postfix/postscreen[15655]: PREGREET 22 after 0.37 from [196.195.14.59]:50938: HELO [196.195.14.59]

...
2019-07-20 21:54:18
79.8.32.157 attack
Automatic report - Port Scan Attack
2019-07-20 21:48:29
142.93.174.47 attack
Jul 20 10:13:28 plusreed sshd[32466]: Invalid user geng from 142.93.174.47
...
2019-07-20 22:15:05
82.208.137.206 attackbots
445/tcp
[2019-07-20]1pkt
2019-07-20 21:20:54
200.188.151.212 attack
SS1,DEF GET //wp-login.php
2019-07-20 21:25:16
222.186.52.123 attackspambots
2019-07-20T14:03:07.948149abusebot-8.cloudsearch.cf sshd\[23948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.123  user=root
2019-07-20 22:05:46
203.121.116.11 attackbots
Jul 20 14:09:53 mail sshd\[30982\]: Failed password for invalid user tester from 203.121.116.11 port 39757 ssh2
Jul 20 14:27:29 mail sshd\[31214\]: Invalid user Redistoor from 203.121.116.11 port 37603
...
2019-07-20 21:32:04
190.254.195.234 attackspambots
9527/tcp
[2019-07-20]1pkt
2019-07-20 21:43:12
195.138.245.196 attackbots
DE from shcl-d4dcd.serverlet.com [195.138.245.196]:43585
2019-07-20 22:18:20
27.0.141.4 attackspam
Jul 20 15:35:00 microserver sshd[40629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.0.141.4  user=root
Jul 20 15:35:03 microserver sshd[40629]: Failed password for root from 27.0.141.4 port 39388 ssh2
Jul 20 15:40:15 microserver sshd[41699]: Invalid user developer from 27.0.141.4 port 37590
Jul 20 15:40:15 microserver sshd[41699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.0.141.4
Jul 20 15:40:17 microserver sshd[41699]: Failed password for invalid user developer from 27.0.141.4 port 37590 ssh2
Jul 20 15:50:53 microserver sshd[43113]: Invalid user vncuser from 27.0.141.4 port 33996
Jul 20 15:50:53 microserver sshd[43113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.0.141.4
Jul 20 15:50:55 microserver sshd[43113]: Failed password for invalid user vncuser from 27.0.141.4 port 33996 ssh2
Jul 20 15:56:19 microserver sshd[43839]: Invalid user oracle from 27.0.141.4 port 604
2019-07-20 22:19:18
178.218.32.54 attackspambots
Automatic report - Banned IP Access
2019-07-20 21:27:22
54.38.82.14 attackspambots
$f2bV_matches
2019-07-20 21:26:42
129.126.97.62 attackbots
8080/tcp 8080/tcp
[2019-07-20]2pkt
2019-07-20 21:35:12

Recently Reported IPs

201.5.152.184 188.108.201.55 33.67.77.67 118.125.242.245
200.175.178.38 38.32.70.12 160.170.84.2 26.141.190.78
223.183.117.99 89.11.104.218 86.58.63.140 201.46.136.32
27.175.163.224 206.134.160.150 98.236.142.152 142.14.13.152
135.85.55.121 7.212.113.2 169.4.243.70 231.183.246.237