Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.96.134.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12754
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.96.134.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:03:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 66.134.96.132.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 132.96.134.66.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
118.42.125.170 attack
Sep  1 21:39:49 lcdev sshd\[21709\]: Invalid user post1 from 118.42.125.170
Sep  1 21:39:49 lcdev sshd\[21709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
Sep  1 21:39:51 lcdev sshd\[21709\]: Failed password for invalid user post1 from 118.42.125.170 port 56160 ssh2
Sep  1 21:44:26 lcdev sshd\[22085\]: Invalid user ajmal from 118.42.125.170
Sep  1 21:44:26 lcdev sshd\[22085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.42.125.170
2019-09-02 19:37:17
118.46.202.35 attackbots
SSH/22 MH Probe, BF, Hack -
2019-09-02 18:25:23
79.182.95.222 attackbotsspam
23/tcp
[2019-09-02]1pkt
2019-09-02 18:21:28
128.199.255.146 attackbotsspam
2019-08-31T00:56:27.400Z CLOSE host=128.199.255.146 port=52058 fd=11 time=380.084 bytes=447
...
2019-09-02 19:36:55
187.12.181.106 attack
Sep  2 07:07:33 yabzik sshd[10383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.181.106
Sep  2 07:07:35 yabzik sshd[10383]: Failed password for invalid user user1 from 187.12.181.106 port 56818 ssh2
Sep  2 07:12:34 yabzik sshd[12278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.12.181.106
2019-09-02 17:59:50
101.89.166.204 attackspambots
Sep  2 06:21:01 MK-Soft-VM3 sshd\[1764\]: Invalid user matias from 101.89.166.204 port 51194
Sep  2 06:21:01 MK-Soft-VM3 sshd\[1764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.166.204
Sep  2 06:21:03 MK-Soft-VM3 sshd\[1764\]: Failed password for invalid user matias from 101.89.166.204 port 51194 ssh2
...
2019-09-02 19:48:13
106.12.176.17 attackspam
Sep  2 12:09:21 mail sshd\[7410\]: Failed password for invalid user mju76yhn from 106.12.176.17 port 54588 ssh2
Sep  2 12:13:57 mail sshd\[8378\]: Invalid user dashboard from 106.12.176.17 port 37034
Sep  2 12:13:57 mail sshd\[8378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.17
Sep  2 12:13:58 mail sshd\[8378\]: Failed password for invalid user dashboard from 106.12.176.17 port 37034 ssh2
Sep  2 12:19:00 mail sshd\[9264\]: Invalid user blaze123 from 106.12.176.17 port 47712
2019-09-02 19:36:01
182.253.71.242 attack
$f2bV_matches
2019-09-02 19:26:32
36.7.78.252 attackbotsspam
Sep  2 06:06:41 ny01 sshd[28978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.78.252
Sep  2 06:06:43 ny01 sshd[28978]: Failed password for invalid user python from 36.7.78.252 port 33584 ssh2
Sep  2 06:08:54 ny01 sshd[29320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.7.78.252
2019-09-02 18:10:19
60.144.203.3 attack
445/tcp
[2019-09-02]1pkt
2019-09-02 18:36:53
79.170.202.194 attackbotsspam
Chat Spam
2019-09-02 19:41:31
42.118.204.63 attackspambots
23/tcp
[2019-09-02]1pkt
2019-09-02 19:28:25
187.190.236.88 attackspambots
Fail2Ban Ban Triggered
2019-09-02 18:22:39
61.135.33.30 attackbotsspam
SS5,WP GET /wp/wp-login.php
GET /wp/wp-login.php
2019-09-02 18:12:20
103.124.165.167 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-09-02 19:15:32

Recently Reported IPs

94.121.187.240 177.110.152.214 7.29.103.231 62.132.141.233
14.93.175.220 224.231.198.46 207.238.108.117 240.15.114.238
239.169.107.223 22.74.108.54 61.55.52.129 196.191.219.70
90.82.138.156 100.208.185.89 244.201.228.222 83.15.219.139
19.174.190.11 148.181.154.10 73.163.142.70 77.36.172.31