Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.49.219.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20606
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.49.219.138.			IN	A

;; AUTHORITY SECTION:
.			282	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:08:19 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 138.219.49.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 132.49.219.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
45.163.144.2 attackspambots
May 11 22:58:45 localhost sshd\[10711\]: Invalid user daniela from 45.163.144.2
May 11 22:58:45 localhost sshd\[10711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2
May 11 22:58:47 localhost sshd\[10711\]: Failed password for invalid user daniela from 45.163.144.2 port 42182 ssh2
May 11 23:00:16 localhost sshd\[10877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2  user=root
May 11 23:00:17 localhost sshd\[10877\]: Failed password for root from 45.163.144.2 port 35096 ssh2
...
2020-05-12 05:09:00
121.122.40.109 attack
May 11 22:28:58 rotator sshd\[27052\]: Invalid user test from 121.122.40.109May 11 22:29:00 rotator sshd\[27052\]: Failed password for invalid user test from 121.122.40.109 port 51713 ssh2May 11 22:33:06 rotator sshd\[27844\]: Invalid user adam from 121.122.40.109May 11 22:33:07 rotator sshd\[27844\]: Failed password for invalid user adam from 121.122.40.109 port 48412 ssh2May 11 22:37:01 rotator sshd\[28630\]: Invalid user ubuntu from 121.122.40.109May 11 22:37:03 rotator sshd\[28630\]: Failed password for invalid user ubuntu from 121.122.40.109 port 40107 ssh2
...
2020-05-12 05:04:11
104.236.156.136 attack
May 11 23:09:21 [host] sshd[18807]: Invalid user m
May 11 23:09:21 [host] sshd[18807]: pam_unix(sshd:
May 11 23:09:24 [host] sshd[18807]: Failed passwor
2020-05-12 05:10:12
77.49.115.206 attack
2020-05-11T20:49:45.326369shield sshd\[17612\]: Invalid user joan from 77.49.115.206 port 58106
2020-05-11T20:49:45.330123shield sshd\[17612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.49.115.206.dsl.dyn.forthnet.gr
2020-05-11T20:49:47.116639shield sshd\[17612\]: Failed password for invalid user joan from 77.49.115.206 port 58106 ssh2
2020-05-11T20:54:00.969308shield sshd\[18429\]: Invalid user roman from 77.49.115.206 port 39796
2020-05-11T20:54:00.973156shield sshd\[18429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.49.115.206.dsl.dyn.forthnet.gr
2020-05-12 05:03:49
159.65.59.41 attackspam
2020-05-12T06:09:59.058205vivaldi2.tree2.info sshd[25262]: Invalid user vwalker from 159.65.59.41
2020-05-12T06:09:59.071529vivaldi2.tree2.info sshd[25262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.59.41
2020-05-12T06:09:59.058205vivaldi2.tree2.info sshd[25262]: Invalid user vwalker from 159.65.59.41
2020-05-12T06:10:01.036658vivaldi2.tree2.info sshd[25262]: Failed password for invalid user vwalker from 159.65.59.41 port 39562 ssh2
2020-05-12T06:13:50.374835vivaldi2.tree2.info sshd[25586]: Invalid user operador from 159.65.59.41
...
2020-05-12 05:23:25
111.229.110.107 attackbots
May 11 16:39:00 ny01 sshd[27516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107
May 11 16:39:03 ny01 sshd[27516]: Failed password for invalid user test from 111.229.110.107 port 56344 ssh2
May 11 16:43:29 ny01 sshd[28099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.110.107
2020-05-12 04:48:20
61.152.70.126 attack
SSH Bruteforce attack
2020-05-12 05:24:20
192.241.135.138 attackspambots
05/11/2020-16:37:19.865674 192.241.135.138 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-12 04:51:47
185.50.149.10 attackspam
May 11 23:05:08 web01.agentur-b-2.de postfix/smtpd[334244]: warning: unknown[185.50.149.10]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 23:05:10 web01.agentur-b-2.de postfix/smtpd[334244]: lost connection after AUTH from unknown[185.50.149.10]
May 11 23:05:21 web01.agentur-b-2.de postfix/smtpd[330088]: lost connection after AUTH from unknown[185.50.149.10]
May 11 23:05:28 web01.agentur-b-2.de postfix/smtpd[335693]: warning: unknown[185.50.149.10]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 11 23:05:28 web01.agentur-b-2.de postfix/smtpd[335693]: lost connection after AUTH from unknown[185.50.149.10]
2020-05-12 05:12:28
122.51.82.22 attack
May 11 17:01:36 NPSTNNYC01T sshd[12576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.82.22
May 11 17:01:37 NPSTNNYC01T sshd[12576]: Failed password for invalid user test from 122.51.82.22 port 49258 ssh2
May 11 17:04:19 NPSTNNYC01T sshd[12895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.82.22
...
2020-05-12 05:13:55
88.157.229.59 attack
k+ssh-bruteforce
2020-05-12 04:49:08
159.65.131.92 attack
May 11 22:33:05 pve1 sshd[22003]: Failed password for root from 159.65.131.92 port 47766 ssh2
May 11 22:37:12 pve1 sshd[22870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.131.92 
...
2020-05-12 04:59:10
152.136.50.26 attackbots
May 11 22:59:02 plex sshd[26685]: Invalid user abc123 from 152.136.50.26 port 59484
2020-05-12 05:00:01
92.211.212.170 attack
May 11 22:43:41 vmd26974 sshd[30067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.211.212.170
May 11 22:43:43 vmd26974 sshd[30067]: Failed password for invalid user vivian from 92.211.212.170 port 33739 ssh2
...
2020-05-12 04:55:41
106.12.113.223 attackbotsspam
May 11 20:35:45 powerpi2 sshd[9430]: Invalid user sonos from 106.12.113.223 port 39502
May 11 20:35:47 powerpi2 sshd[9430]: Failed password for invalid user sonos from 106.12.113.223 port 39502 ssh2
May 11 20:37:23 powerpi2 sshd[9509]: Invalid user user from 106.12.113.223 port 51786
...
2020-05-12 04:45:13

Recently Reported IPs

120.141.155.223 136.237.148.75 154.107.91.0 107.151.46.185
144.138.254.130 153.134.151.223 115.19.103.242 137.150.98.43
200.194.249.113 178.155.109.79 168.229.134.224 156.8.197.161
148.99.17.113 181.186.28.98 108.206.248.77 85.34.7.176
43.80.68.3 53.219.29.35 171.115.58.44 134.74.186.13