Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.243.142.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34487
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.243.142.132.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 02:38:28 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 132.142.243.203.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.142.243.203.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.55.62.187 attackbots
Unauthorized connection attempt from IP address 177.55.62.187 on Port 445(SMB)
2020-09-05 02:24:52
68.183.234.44 attack
WordPress login Brute force / Web App Attack on client site.
2020-09-05 02:28:14
189.167.239.191 attackspam
Honeypot attack, port: 445, PTR: dsl-189-167-239-191-dyn.prod-infinitum.com.mx.
2020-09-05 02:32:09
151.225.69.127 attack
Sep  4 01:28:49 scw-6657dc sshd[20032]: Invalid user pi from 151.225.69.127 port 52170
Sep  4 01:28:49 scw-6657dc sshd[20032]: Invalid user pi from 151.225.69.127 port 52170
Sep  4 01:28:49 scw-6657dc sshd[20033]: Invalid user pi from 151.225.69.127 port 52174
...
2020-09-05 02:53:16
144.91.78.125 attackbots
1433/tcp 445/tcp...
[2020-07-07/09-04]12pkt,2pt.(tcp)
2020-09-05 02:17:28
193.193.71.178 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-05 02:46:01
45.6.18.65 attack
2020-07-31 05:27:08,324 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 45.6.18.65
2020-07-31 05:47:12,803 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 45.6.18.65
2020-07-31 06:07:16,482 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 45.6.18.65
2020-07-31 06:27:06,416 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 45.6.18.65
2020-07-31 06:47:23,282 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 45.6.18.65
...
2020-09-05 02:15:11
176.248.187.114 attackbots
Port Scan: TCP/443
2020-09-05 02:22:08
129.211.10.111 attackspam
Sep  4 12:32:49 lanister sshd[4052]: Invalid user liam from 129.211.10.111
Sep  4 12:32:49 lanister sshd[4052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.10.111
Sep  4 12:32:49 lanister sshd[4052]: Invalid user liam from 129.211.10.111
Sep  4 12:32:51 lanister sshd[4052]: Failed password for invalid user liam from 129.211.10.111 port 35678 ssh2
2020-09-05 02:32:54
186.5.204.249 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-09-05 02:43:29
118.89.177.212 attack
Sep  4 14:53:32 haigwepa sshd[584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.177.212 
Sep  4 14:53:34 haigwepa sshd[584]: Failed password for invalid user ser from 118.89.177.212 port 36918 ssh2
...
2020-09-05 02:38:16
27.148.190.100 attackspambots
2020-09-04T14:15:24.520063xentho-1 sshd[473811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100
2020-09-04T14:15:24.511893xentho-1 sshd[473811]: Invalid user vilma from 27.148.190.100 port 36988
2020-09-04T14:15:26.745251xentho-1 sshd[473811]: Failed password for invalid user vilma from 27.148.190.100 port 36988 ssh2
2020-09-04T14:16:17.624365xentho-1 sshd[473832]: Invalid user das from 27.148.190.100 port 48566
2020-09-04T14:16:17.632055xentho-1 sshd[473832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100
2020-09-04T14:16:17.624365xentho-1 sshd[473832]: Invalid user das from 27.148.190.100 port 48566
2020-09-04T14:16:19.798672xentho-1 sshd[473832]: Failed password for invalid user das from 27.148.190.100 port 48566 ssh2
2020-09-04T14:17:16.781412xentho-1 sshd[473842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.190.100  user
...
2020-09-05 02:19:07
222.186.160.114 attack
Sep  4 19:42:53 santamaria sshd\[20433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.160.114  user=root
Sep  4 19:42:55 santamaria sshd\[20433\]: Failed password for root from 222.186.160.114 port 45306 ssh2
Sep  4 19:47:04 santamaria sshd\[20482\]: Invalid user roy from 222.186.160.114
Sep  4 19:47:04 santamaria sshd\[20482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.160.114
...
2020-09-05 02:36:45
192.241.239.16 attackspam
Port Scan
...
2020-09-05 02:51:16
177.70.154.230 attackbotsspam
1599165974 - 09/03/2020 22:46:14 Host: 177.70.154.230/177.70.154.230 Port: 445 TCP Blocked
2020-09-05 02:15:51

Recently Reported IPs

35.175.209.126 208.64.228.44 185.93.73.119 66.248.178.8
123.194.60.238 201.156.157.196 218.18.147.127 46.28.162.135
177.249.170.224 36.106.167.155 128.199.140.73 103.40.197.2
1.1.168.110 14.36.21.105 5.83.104.158 39.149.99.206
46.190.57.101 177.87.64.200 113.28.90.66 104.152.52.142