Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.83.99.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.83.99.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 02:11:46 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 212.99.83.132.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 132.83.99.212.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.26.167.157 attackbotsspam
Auto Detect Rule!
proto TCP (SYN), 190.26.167.157:41643->gjan.info:23, len 40
2020-09-18 14:48:46
61.216.131.31 attackbots
$f2bV_matches
2020-09-18 14:25:51
185.176.27.14 attackspam
Found on   CINS badguys     / proto=6  .  srcport=47382  .  dstport=15197  .     (147)
2020-09-18 14:34:20
31.156.62.190 attack
Unauthorized connection attempt from IP address 31.156.62.190 on Port 445(SMB)
2020-09-18 14:56:27
112.85.42.172 attackspambots
Sep 18 02:52:06 plusreed sshd[1608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Sep 18 02:52:09 plusreed sshd[1608]: Failed password for root from 112.85.42.172 port 58626 ssh2
...
2020-09-18 14:52:36
61.177.172.61 attack
Sep 18 06:33:26 email sshd\[29398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Sep 18 06:33:28 email sshd\[29398\]: Failed password for root from 61.177.172.61 port 40107 ssh2
Sep 18 06:33:32 email sshd\[29398\]: Failed password for root from 61.177.172.61 port 40107 ssh2
Sep 18 06:33:47 email sshd\[29459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Sep 18 06:33:49 email sshd\[29459\]: Failed password for root from 61.177.172.61 port 6218 ssh2
...
2020-09-18 14:37:25
104.206.128.38 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-18 14:55:29
192.241.208.139 attack
Port Scan
...
2020-09-18 14:41:54
89.205.0.64 attack
Unauthorized access to SSH at 17/Sep/2020:19:53:13 +0000.
2020-09-18 14:22:36
125.161.26.145 attackbotsspam
Bruteforce detected by fail2ban
2020-09-18 14:25:38
117.220.0.146 attackbots
Unauthorized connection attempt from IP address 117.220.0.146 on Port 445(SMB)
2020-09-18 14:28:28
45.183.1.105 attack
Unauthorized connection attempt from IP address 45.183.1.105 on Port 445(SMB)
2020-09-18 14:29:21
27.6.88.37 attackspambots
Mirai and Reaper Exploitation Traffic
2020-09-18 14:58:03
27.111.44.196 attackbots
$f2bV_matches
2020-09-18 14:41:26
2.58.230.41 attack
ssh brute force
2020-09-18 14:56:46

Recently Reported IPs

157.88.51.111 50.16.222.92 238.125.209.91 107.107.63.91
55.26.169.114 9.177.78.209 5.39.248.11 50.173.99.153
57.74.162.123 67.31.42.158 12.129.107.28 192.102.99.235
120.216.103.54 21.112.128.168 176.123.83.98 95.204.17.40
233.23.42.239 223.5.244.211 233.122.91.152 188.66.217.103