Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.132.155.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.132.155.212.		IN	A

;; AUTHORITY SECTION:
.			238	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070701 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 08 12:58:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
212.155.132.142.in-addr.arpa domain name pointer qwertykey.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.155.132.142.in-addr.arpa	name = qwertykey.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.105.41 attackbots
SSH Invalid Login
2020-08-02 06:51:02
106.54.155.35 attackbotsspam
Aug  1 20:47:02 *** sshd[5171]: User root from 106.54.155.35 not allowed because not listed in AllowUsers
2020-08-02 07:02:37
223.149.108.155 attackspambots
Netgear DGN Device Remote Command Execution Vulnerability , PTR: PTR record not found
2020-08-02 07:01:46
193.112.4.12 attackspam
SSH Invalid Login
2020-08-02 06:37:58
85.209.0.103 attack
 TCP (SYN) 85.209.0.103:63840 -> port 22, len 60
2020-08-02 07:07:11
201.149.13.58 attack
Aug  2 00:54:49 sso sshd[29073]: Failed password for root from 201.149.13.58 port 16384 ssh2
...
2020-08-02 07:01:21
122.51.245.240 attackspambots
Invalid user cftest from 122.51.245.240 port 47510
2020-08-02 06:42:04
165.231.98.21 attackbotsspam
Attempting to access Wordpress login on a honeypot or private system.
2020-08-02 06:34:03
79.137.74.57 attackbotsspam
Aug  1 18:01:04 ny01 sshd[7808]: Failed password for root from 79.137.74.57 port 51359 ssh2
Aug  1 18:05:16 ny01 sshd[8326]: Failed password for root from 79.137.74.57 port 57541 ssh2
2020-08-02 06:47:18
101.37.21.63 attackspam
[Sat Aug 01 20:47:35.658198 2020] [core:info] [pid 78624] [client 101.37.21.63:37656] AH00128: File does not exist: /usr/local/www/apache24/data/TP/public/index.php
[Sat Aug 01 20:47:36.247502 2020] [core:info] [pid 656] [client 101.37.21.63:44650] AH00128: File does not exist: /usr/local/www/apache24/data/TP/index.php
...
2020-08-02 06:42:20
198.27.81.94 attackspambots
[01/Aug/2020:22:47:38 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
2020-08-02 06:39:46
203.195.191.249 attackbots
Aug  2 00:48:58 vps647732 sshd[27695]: Failed password for root from 203.195.191.249 port 51984 ssh2
...
2020-08-02 07:05:05
111.229.197.156 attack
Aug  1 22:47:25 debian-2gb-nbg1-2 kernel: \[18573324.122941\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=111.229.197.156 DST=195.201.40.59 LEN=60 TOS=0x00 PREC=0x00 TTL=44 ID=54462 DF PROTO=TCP SPT=33100 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0
2020-08-02 06:48:47
181.229.217.221 attack
Invalid user zyhu from 181.229.217.221 port 42958
2020-08-02 06:32:27
117.69.189.152 attackspam
Aug  2 00:26:59 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:10 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:27 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:47 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  2 00:27:59 srv01 postfix/smtpd\[27882\]: warning: unknown\[117.69.189.152\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-02 06:48:03

Recently Reported IPs

253.196.58.126 192.168.2.208 193.164.131.208 192.168.208.255
157.131.11.10 02.11.208.41 163.47.13.155 116.202.251.16
78.157.42.229 43.129.33.139 103.99.115.220 161.35.55.106
215.189.127.219 92.255.10.145 10.69.192.1 10.69.192.56
121.18.238.56 5.173.0.171 94.23.41.128 185.181.101.131