Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.232.129.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39038
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.232.129.132.		IN	A

;; AUTHORITY SECTION:
.			469	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:36:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
132.129.232.146.in-addr.arpa domain name pointer wildcard.journals.ac.za.
132.129.232.146.in-addr.arpa domain name pointer web.lib.sun.ac.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.129.232.146.in-addr.arpa	name = wildcard.journals.ac.za.
132.129.232.146.in-addr.arpa	name = web.lib.sun.ac.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.216.206.156 attack
Invalid user mcneal from 89.216.206.156 port 60458
2020-05-16 06:34:40
94.103.82.197 attackspambots
0,16-13/07 [bc02/m17] PostRequest-Spammer scoring: brussels
2020-05-16 06:59:11
110.164.93.99 attack
Invalid user configure from 110.164.93.99 port 53292
2020-05-16 07:02:32
159.89.153.54 attack
SSH Invalid Login
2020-05-16 07:03:12
152.32.240.76 attackbots
SSH Invalid Login
2020-05-16 06:58:27
114.237.109.221 attack
SpamScore above: 10.0
2020-05-16 07:02:08
141.98.9.157 attackspambots
May 16 00:43:00 piServer sshd[7972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157 
May 16 00:43:02 piServer sshd[7972]: Failed password for invalid user admin from 141.98.9.157 port 41857 ssh2
May 16 00:43:29 piServer sshd[8043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157 
...
2020-05-16 06:54:11
162.248.52.82 attack
May 15 22:46:21 inter-technics sshd[1969]: Invalid user vincent from 162.248.52.82 port 34944
May 15 22:46:21 inter-technics sshd[1969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82
May 15 22:46:21 inter-technics sshd[1969]: Invalid user vincent from 162.248.52.82 port 34944
May 15 22:46:23 inter-technics sshd[1969]: Failed password for invalid user vincent from 162.248.52.82 port 34944 ssh2
May 15 22:49:03 inter-technics sshd[2075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82  user=postgres
May 15 22:49:05 inter-technics sshd[2075]: Failed password for postgres from 162.248.52.82 port 56320 ssh2
...
2020-05-16 06:34:03
191.83.54.90 attackbotsspam
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2020-05-16 06:50:59
134.122.72.221 attackbots
Invalid user postgres from 134.122.72.221 port 53154
2020-05-16 06:46:11
206.189.92.162 attack
Invalid user arkserver from 206.189.92.162 port 51668
2020-05-16 06:49:15
112.85.42.232 attack
May 16 00:26:24 abendstille sshd\[20801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
May 16 00:26:26 abendstille sshd\[20801\]: Failed password for root from 112.85.42.232 port 64774 ssh2
May 16 00:26:27 abendstille sshd\[20825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
May 16 00:26:29 abendstille sshd\[20801\]: Failed password for root from 112.85.42.232 port 64774 ssh2
May 16 00:26:30 abendstille sshd\[20825\]: Failed password for root from 112.85.42.232 port 53777 ssh2
...
2020-05-16 06:26:57
49.235.202.65 attackbots
SSH Login Bruteforce
2020-05-16 06:36:34
139.219.11.254 attackspam
May 15 06:20:39 : SSH login attempts with invalid user
2020-05-16 06:29:03
220.132.252.172 attack
Port probing on unauthorized port 9000
2020-05-16 06:58:00

Recently Reported IPs

146.247.12.18 146.214.96.228 146.243.121.22 146.247.13.104
146.23.28.130 146.247.14.182 146.247.14.139 146.247.14.19
146.251.63.86 146.247.26.100 146.255.100.76 146.255.100.219
146.255.102.79 146.255.103.178 146.255.0.152 146.255.19.218
146.255.16.194 146.255.19.152 146.255.192.138 146.255.192.75