Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.216.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9589
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.132.216.248.		IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 14:23:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 248.216.132.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.216.132.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.84.95.133 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 16:39:06
139.99.5.223 attackspambots
2019-11-08T08:31:08.186192mail01 postfix/smtpd[31209]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T08:32:38.204450mail01 postfix/smtpd[22413]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08T08:35:58.475070mail01 postfix/smtpd[10215]: warning: ip223.ip-139-99-5.net[139.99.5.223]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-08 16:14:27
123.206.190.82 attack
$f2bV_matches
2019-11-08 16:41:54
50.70.229.239 attackbots
Nov  8 10:14:21 www sshd\[46449\]: Invalid user ak from 50.70.229.239Nov  8 10:14:23 www sshd\[46449\]: Failed password for invalid user ak from 50.70.229.239 port 49028 ssh2Nov  8 10:18:30 www sshd\[46466\]: Invalid user jo from 50.70.229.239
...
2019-11-08 16:22:32
180.183.182.106 attack
Chat Spam
2019-11-08 16:32:58
36.73.113.235 attack
Brute forcing RDP port 3389
2019-11-08 16:45:41
118.25.177.241 attackbotsspam
invalid user
2019-11-08 16:17:19
51.77.140.244 attackspambots
Nov  7 22:07:56 tdfoods sshd\[1856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-77-140.eu  user=root
Nov  7 22:07:58 tdfoods sshd\[1856\]: Failed password for root from 51.77.140.244 port 52458 ssh2
Nov  7 22:15:34 tdfoods sshd\[2502\]: Invalid user somansh from 51.77.140.244
Nov  7 22:15:34 tdfoods sshd\[2502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=244.ip-51-77-140.eu
Nov  7 22:15:36 tdfoods sshd\[2502\]: Failed password for invalid user somansh from 51.77.140.244 port 37160 ssh2
2019-11-08 16:23:38
196.200.176.68 attackbots
2019-11-08T08:06:35.385492shield sshd\[11038\]: Invalid user testsfts from 196.200.176.68 port 50004
2019-11-08T08:06:35.389990shield sshd\[11038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.176.68
2019-11-08T08:06:37.043110shield sshd\[11038\]: Failed password for invalid user testsfts from 196.200.176.68 port 50004 ssh2
2019-11-08T08:10:30.909167shield sshd\[11534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.176.68  user=root
2019-11-08T08:10:32.823280shield sshd\[11534\]: Failed password for root from 196.200.176.68 port 40716 ssh2
2019-11-08 16:26:00
120.42.158.32 attack
2019-11-08 07:23:17 H=(tvtbm.com) [120.42.158.32]:11358 I=[10.100.18.20]:25 sender verify fail for : Unrouteable address
2019-11-08 x@x
2019-11-08 07:23:17 H=(tvtbm.com) [120.42.158.32]:11350 I=[10.100.18.20]:25 sender verify fail for : Unrouteable address


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.42.158.32
2019-11-08 16:19:30
118.192.66.91 attackbotsspam
F2B jail: sshd. Time: 2019-11-08 08:57:50, Reported by: VKReport
2019-11-08 16:11:46
138.68.57.207 attackbotsspam
POST /wp-login.php HTTP/1.1 200 1827 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-11-08 16:40:37
118.25.108.198 attackbots
2019-11-08T08:08:43.094579abusebot-7.cloudsearch.cf sshd\[31956\]: Invalid user www from 118.25.108.198 port 44912
2019-11-08 16:42:20
45.125.66.31 attackbotsspam
\[2019-11-08 03:02:20\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T03:02:20.022-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="795501148178599002",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/63490",ACLName="no_extension_match"
\[2019-11-08 03:02:35\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T03:02:35.357-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="125001148163072004",SessionID="0x7fdf2c3f5928",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/62554",ACLName="no_extension_match"
\[2019-11-08 03:02:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-08T03:02:57.544-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="471401148483829004",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.31/59007",ACLName="
2019-11-08 16:22:49
222.186.190.2 attack
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186
...
2019-11-08 16:20:20

Recently Reported IPs

164.132.21.164 164.132.199.114 164.132.219.2 164.132.241.183
164.132.239.233 164.132.214.96 164.132.250.34 164.132.219.116
164.132.27.222 164.132.22.240 164.132.251.215 164.132.27.240
164.132.63.35 164.132.73.177 164.132.29.101 164.132.63.146
164.132.74.198 164.132.29.96 164.132.81.145 164.132.81.93