Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bogotá

Region: Bogota D.C.

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.102.214.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.102.214.132.		IN	A

;; AUTHORITY SECTION:
.			114	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 16:54:13 CST 2022
;; MSG SIZE  rcvd: 108
Host info
132.214.102.191.in-addr.arpa domain name pointer 132-214-102-191.internet.directv.com.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.214.102.191.in-addr.arpa	name = 132-214-102-191.internet.directv.com.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.67.64.28 attack
Invalid user backup from 114.67.64.28 port 53818
2020-05-15 19:29:06
41.133.142.252 attack
Hits on port : 445
2020-05-15 19:12:20
70.37.72.190 attack
38 attacks on Wordpress URLs like:
70.37.72.190 - - [14/May/2020:23:39:11 +0100] "GET /sito/wp-includes/wlwmanifest.xml HTTP/1.1" 404 1128 "-" "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36"
2020-05-15 19:32:56
122.152.217.9 attackbotsspam
Invalid user cvs from 122.152.217.9 port 32990
2020-05-15 19:26:13
134.175.32.95 attackbotsspam
May 15 09:26:23 XXXXXX sshd[57493]: Invalid user rax from 134.175.32.95 port 37706
2020-05-15 19:37:25
103.242.56.174 attack
May 15 13:03:12 sip sshd[270691]: Failed password for invalid user peer from 103.242.56.174 port 46779 ssh2
May 15 13:05:13 sip sshd[270705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.56.174  user=root
May 15 13:05:15 sip sshd[270705]: Failed password for root from 103.242.56.174 port 59845 ssh2
...
2020-05-15 19:19:47
189.2.252.178 attack
May 15 18:15:44 pihole sshd[9837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.2.252.178 
...
2020-05-15 19:42:20
115.75.42.231 attackbots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-05-15 19:15:36
122.226.134.39 attackbots
May 15 11:36:09 game-panel sshd[15040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.226.134.39
May 15 11:36:11 game-panel sshd[15040]: Failed password for invalid user musikbot from 122.226.134.39 port 55472 ssh2
May 15 11:38:32 game-panel sshd[15117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.226.134.39
2020-05-15 19:41:21
54.37.224.163 attack
SSH Brute Force
2020-05-15 19:16:33
209.17.97.66 attack
137/udp 8000/tcp 8443/tcp...
[2020-03-17/05-15]59pkt,11pt.(tcp),1pt.(udp)
2020-05-15 19:13:28
180.76.232.80 attackspambots
Invalid user test from 180.76.232.80 port 44086
2020-05-15 19:27:37
163.172.24.40 attackbots
May 15 07:10:10 ny01 sshd[17226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.24.40
May 15 07:10:11 ny01 sshd[17226]: Failed password for invalid user ubuntu from 163.172.24.40 port 58887 ssh2
May 15 07:15:23 ny01 sshd[17873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.24.40
2020-05-15 19:17:53
122.15.91.154 attackbots
2020-05-15T08:33:57.021661v22018076590370373 sshd[17949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.91.154
2020-05-15T08:33:57.013615v22018076590370373 sshd[17949]: Invalid user ps3 from 122.15.91.154 port 53486
2020-05-15T08:33:58.997950v22018076590370373 sshd[17949]: Failed password for invalid user ps3 from 122.15.91.154 port 53486 ssh2
2020-05-15T08:39:36.660382v22018076590370373 sshd[10674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.15.91.154  user=root
2020-05-15T08:39:38.510968v22018076590370373 sshd[10674]: Failed password for root from 122.15.91.154 port 60580 ssh2
...
2020-05-15 19:32:25
106.12.205.237 attackspam
$f2bV_matches
2020-05-15 19:09:09

Recently Reported IPs

42.128.46.239 54.197.30.4 50.85.62.176 40.247.160.140
54.36.242.202 124.86.40.113 222.232.225.200 112.174.160.83
247.87.245.236 165.247.86.55 161.170.103.92 34.131.229.69
97.93.97.183 129.51.104.116 84.139.130.24 24.98.187.125
165.65.15.215 179.13.113.37 28.81.92.244 153.239.138.169