Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.19.106.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.19.106.132.			IN	A

;; AUTHORITY SECTION:
.			559	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 05:45:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 132.106.19.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.106.19.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
60.223.251.177 attackspam
Aug  3 23:15:40 localhost sshd[23489]: Invalid user admin from 60.223.251.177 port 34650
Aug  3 23:15:40 localhost sshd[23489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.223.251.177
Aug  3 23:15:40 localhost sshd[23489]: Invalid user admin from 60.223.251.177 port 34650
Aug  3 23:15:42 localhost sshd[23489]: Failed password for invalid user admin from 60.223.251.177 port 34650 ssh2
...
2019-08-04 00:56:47
188.136.201.123 attackbots
Automatic report - Port Scan Attack
2019-08-04 00:42:28
129.150.122.243 attackbotsspam
Aug  3 17:27:23 mail sshd\[13426\]: Failed password for invalid user prova from 129.150.122.243 port 31829 ssh2
Aug  3 17:45:21 mail sshd\[13725\]: Invalid user cperez from 129.150.122.243 port 14966
...
2019-08-04 01:11:39
37.59.49.177 attackbots
Aug  3 17:59:32 root sshd[15225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.49.177 
Aug  3 17:59:34 root sshd[15225]: Failed password for invalid user pa from 37.59.49.177 port 42846 ssh2
Aug  3 18:03:44 root sshd[15273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.49.177 
...
2019-08-04 00:47:57
27.71.163.37 attack
Automatic report - Port Scan Attack
2019-08-04 01:43:14
73.239.74.11 attack
Automated report - ssh fail2ban:
Aug 3 17:53:21 authentication failure 
Aug 3 17:53:23 wrong password, user=wordpress, port=35444, ssh2
Aug 3 18:25:09 authentication failure
2019-08-04 00:44:19
115.214.74.119 attack
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x
2019-08-02 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.214.74.119
2019-08-04 01:35:30
163.172.58.50 attackbotsspam
Blocked range because of multiple attacks in the past. @ 2019-08-03T17:06:17+02:00.
2019-08-04 01:12:50
112.85.42.188 attackbots
detected by Fail2Ban
2019-08-04 01:40:12
77.40.90.124 attackspam
Brute force attempt
2019-08-04 00:35:04
178.46.160.42 attackspam
failed_logins
2019-08-04 01:06:04
51.15.153.37 attackspam
\[2019-08-03 18:12:38\] NOTICE\[18654\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '51.15.153.37:3173' \(callid: 635534118-1397797090-1424667973\) - Failed to authenticate
\[2019-08-03 18:12:38\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-03T18:12:38.024+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="635534118-1397797090-1424667973",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/51.15.153.37/3173",Challenge="1564848757/400b32f554f26a78a6251423d166499c",Response="9bad4b0fb3d47e48ae5fbd6967d05fa4",ExpectedResponse=""
\[2019-08-03 18:12:38\] NOTICE\[24264\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '51.15.153.37:3173' \(callid: 635534118-1397797090-1424667973\) - Failed to authenticate
\[2019-08-03 18:12:38\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseF
2019-08-04 00:41:06
51.38.57.78 attack
Aug  3 18:36:53 SilenceServices sshd[780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
Aug  3 18:36:55 SilenceServices sshd[780]: Failed password for invalid user kimmo from 51.38.57.78 port 58648 ssh2
Aug  3 18:40:51 SilenceServices sshd[3107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
2019-08-04 00:43:58
181.30.26.40 attackspambots
Aug  3 19:20:34 srv-4 sshd\[11466\]: Invalid user xue from 181.30.26.40
Aug  3 19:20:34 srv-4 sshd\[11466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40
Aug  3 19:20:36 srv-4 sshd\[11466\]: Failed password for invalid user xue from 181.30.26.40 port 54654 ssh2
...
2019-08-04 01:12:14
187.34.1.76 attackbotsspam
Unauthorised access (Aug  3) SRC=187.34.1.76 LEN=44 TTL=50 ID=42244 TCP DPT=23 WINDOW=5212 SYN
2019-08-04 00:58:58

Recently Reported IPs

62.71.120.89 103.53.81.152 250.231.158.17 63.41.42.191
177.47.21.36 209.25.44.123 134.170.36.215 2003:d5:671b:8ae8:8ce0:db07:3853:81a2
190.87.203.56 167.68.176.90 31.53.211.25 109.143.191.229
58.134.239.28 206.125.60.255 200.195.85.142 12.217.237.92
201.233.169.227 193.141.107.203 159.55.154.253 246.224.181.242