Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.85.119.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.85.119.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 12:33:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.119.85.132.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 132.85.119.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
177.38.178.25 attackspam
Aug  8 04:08:45 wp sshd[471]: Did not receive identification string from 177.38.178.25
Aug  8 04:10:41 wp sshd[486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-38-178-25.micks.com.br  user=r.r
Aug  8 04:10:43 wp sshd[486]: Failed password for r.r from 177.38.178.25 port 54366 ssh2
Aug  8 04:10:43 wp sshd[486]: Received disconnect from 177.38.178.25: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  8 04:11:49 wp sshd[488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-38-178-25.micks.com.br  user=r.r
Aug  8 04:11:50 wp sshd[488]: Failed password for r.r from 177.38.178.25 port 40478 ssh2
Aug  8 04:11:51 wp sshd[488]: Received disconnect from 177.38.178.25: 11: Normal Shutdown, Thank you for playing [preauth]
Aug  8 04:12:55 wp sshd[492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177-38-178-25.micks.com.br  user=r.r
Aug  8 0........
-------------------------------
2019-08-09 13:57:57
145.249.104.203 attackspam
fire
2019-08-09 13:26:42
110.43.33.62 attackbotsspam
/ueditor/net/controller.ashx
2019-08-09 13:38:57
93.156.47.135 attack
Aug  8 13:42:39 w sshd[14582]: Invalid user admin from 93.156.47.135
Aug  8 13:42:39 w sshd[14582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-93-156-47-135.telecable.es 
Aug  8 13:42:41 w sshd[14582]: Failed password for invalid user admin from 93.156.47.135 port 52004 ssh2
Aug  8 13:42:42 w sshd[14584]: Invalid user service from 93.156.47.135
Aug  8 13:42:42 w sshd[14584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-93-156-47-135.telecable.es 
Aug  8 13:42:44 w sshd[14582]: Failed password for invalid user admin from 93.156.47.135 port 52004 ssh2
Aug  8 13:42:45 w sshd[14584]: Failed password for invalid user service from 93.156.47.135 port 52019 ssh2
Aug  8 13:42:45 w sshd[14582]: Failed password for invalid user admin from 93.156.47.135 port 52004 ssh2
Aug  8 13:42:47 w sshd[14584]: Failed password for invalid user service from 93.156.47.135 port 52019 ssh2


........
--------------------------------------------
2019-08-09 13:39:33
49.212.148.139 attack
Aug  9 06:50:42 ubuntu-2gb-nbg1-dc3-1 sshd[28717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.212.148.139
Aug  9 06:50:44 ubuntu-2gb-nbg1-dc3-1 sshd[28717]: Failed password for invalid user lim from 49.212.148.139 port 43270 ssh2
...
2019-08-09 13:51:09
59.48.153.231 attackbotsspam
frenzy
2019-08-09 14:11:24
64.136.154.172 attackspam
Multiple failed RDP login attempts
2019-08-09 13:29:43
175.211.116.238 attack
$f2bV_matches
2019-08-09 14:12:18
128.199.46.189 attack
fire
2019-08-09 14:05:05
39.62.34.179 attack
Automatic report - Port Scan Attack
2019-08-09 13:55:43
207.46.13.75 attack
Automatic report - Banned IP Access
2019-08-09 14:00:31
111.126.72.52 attackbotsspam
ssh failed login
2019-08-09 13:39:13
13.92.254.50 attackbots
fire
2019-08-09 14:01:35
188.166.70.245 attack
Automatic report - Banned IP Access
2019-08-09 14:16:36
185.53.88.26 attackbots
Automatic report - Port Scan Attack
2019-08-09 14:08:44

Recently Reported IPs

130.114.158.101 115.51.64.141 163.62.149.101 196.91.183.173
118.67.104.63 176.133.203.228 246.217.238.224 22.152.89.52
237.181.183.4 176.48.167.229 37.138.245.227 127.133.30.242
155.90.13.43 209.167.150.69 50.64.1.87 141.78.208.190
157.106.160.100 120.22.190.173 33.225.62.87 21.138.98.71