Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.84.215.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.84.215.1.			IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010600 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 00:20:15 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b'Host 1.215.84.132.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 132.84.215.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
77.247.110.216 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 67 - port: 5065 proto: UDP cat: Misc Attack
2019-10-26 07:05:20
89.248.168.217 attackspam
firewall-block, port(s): 514/udp, 593/udp, 996/udp, 999/udp
2019-10-26 07:01:22
45.136.108.38 attackbots
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 1000 proto: TCP cat: Attempted Information Leak
2019-10-26 07:10:47
112.175.124.88 attackspambots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-26 07:24:35
37.9.8.234 attackspam
10/25/2019-18:40:11.020485 37.9.8.234 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-26 07:12:08
89.248.160.193 attack
firewall-block, port(s): 7842/tcp, 7843/tcp, 7851/tcp, 7856/tcp, 7862/tcp, 7876/tcp, 7899/tcp
2019-10-26 07:02:12
92.118.160.53 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 90 - port: 53 proto: UDP cat: Misc Attack
2019-10-26 06:59:05
27.36.116.84 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 14 - port: 1433 proto: TCP cat: Misc Attack
2019-10-26 07:14:09
71.6.135.131 attackbotsspam
25.10.2019 22:37:53 Connection to port 3749 blocked by firewall
2019-10-26 07:07:12
104.140.188.2 attackspam
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2019-10-26 07:26:56
185.156.73.7 attack
15031/tcp 15032/tcp 15033/tcp...
[2019-10-17/25]762pkt,213pt.(tcp)
2019-10-26 07:20:36
185.246.128.26 attackspambots
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-26 07:17:28
88.214.26.16 attack
ET DROP Dshield Block Listed Source group 1 - port: 1000 proto: TCP cat: Misc Attack
2019-10-26 07:02:51
45.143.220.14 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-10-26 07:10:15
159.203.201.78 attack
ET DROP Dshield Block Listed Source group 1 - port: 8022 proto: TCP cat: Misc Attack
2019-10-26 07:23:13

Recently Reported IPs

194.65.31.150 159.12.177.164 79.102.49.179 175.194.169.200
219.25.22.24 151.8.184.3 18.63.53.136 125.17.100.27
231.132.129.231 121.194.252.162 152.24.245.33 180.164.72.104
58.118.225.50 113.239.50.151 5.8.65.212 193.187.94.100
222.77.69.1 232.186.152.151 97.221.139.198 188.80.230.165