Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.242.12.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.242.12.132.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060602 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 07 08:48:52 CST 2023
;; MSG SIZE  rcvd: 107
Host info
b'Host 132.12.242.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 132.12.242.214.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.247.132.79 attack
Sep 10 16:48:34 legacy sshd[3279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.132.79
Sep 10 16:48:36 legacy sshd[3279]: Failed password for invalid user vmadmin from 49.247.132.79 port 51622 ssh2
Sep 10 16:55:30 legacy sshd[3595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.132.79
...
2019-09-11 01:24:58
185.93.3.107 attackbotsspam
(From raphaeTeroblalley@gmail.com) Hello!  familychiropractorsofridgewood.com 
 
Have you ever heard of sending messages via feedback forms? 
 
Think of that your message will be readseen by hundreds of thousands of your future customerscustomers. 
Your message will not go to the spam folder because people will send the message to themselves. As an example, we have sent you our offer  in the same way. 
 
We have a database of more than 30 million sites to which we can send your offer. Sites are sorted by country. Unfortunately, you can only select a country when sending a letter. 
 
The cost of one million messages 49 USD. 
There is a discount program when you purchase  more than two million letter packages. 
 
 
Free proof mailing of 50,000 messages to any country of your selection. 
 
 
This letter is created automatically. Please use the contact details below to contact us. 
 
 
 
Contact us. 
Telegram - @FeedbackFormEU 
Skype  FeedbackForm2019 
Email - Contact@feedbackmessages.com
2019-09-11 01:35:41
112.85.42.185 attackbots
Sep 10 11:10:32 aat-srv002 sshd[13450]: Failed password for root from 112.85.42.185 port 19598 ssh2
Sep 10 11:10:34 aat-srv002 sshd[13450]: Failed password for root from 112.85.42.185 port 19598 ssh2
Sep 10 11:10:36 aat-srv002 sshd[13450]: Failed password for root from 112.85.42.185 port 19598 ssh2
Sep 10 11:11:33 aat-srv002 sshd[13483]: Failed password for root from 112.85.42.185 port 49178 ssh2
...
2019-09-11 00:20:45
218.98.26.182 attackbots
Sep 10 07:27:48 auw2 sshd\[13423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.182  user=root
Sep 10 07:27:50 auw2 sshd\[13423\]: Failed password for root from 218.98.26.182 port 25310 ssh2
Sep 10 07:27:57 auw2 sshd\[13433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.182  user=root
Sep 10 07:27:59 auw2 sshd\[13433\]: Failed password for root from 218.98.26.182 port 51328 ssh2
Sep 10 07:28:05 auw2 sshd\[13443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.182  user=root
2019-09-11 01:30:17
36.189.255.162 attackspambots
Sep 10 14:33:23 localhost sshd\[6361\]: Invalid user password from 36.189.255.162 port 39828
Sep 10 14:33:23 localhost sshd\[6361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.189.255.162
Sep 10 14:33:25 localhost sshd\[6361\]: Failed password for invalid user password from 36.189.255.162 port 39828 ssh2
2019-09-11 01:27:55
186.151.201.54 attackbots
Automatic report - Banned IP Access
2019-09-11 00:06:55
5.249.154.119 attack
Sep 10 13:27:44 icinga sshd[356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.154.119
Sep 10 13:27:46 icinga sshd[356]: Failed password for invalid user proftpd from 5.249.154.119 port 57874 ssh2
...
2019-09-11 01:12:31
181.81.127.104 attackspambots
Unauthorised access (Sep 10) SRC=181.81.127.104 LEN=40 TTL=47 ID=12394 TCP DPT=23 WINDOW=43908 SYN
2019-09-11 00:49:39
41.32.117.114 attackspambots
Unauthorized connection attempt from IP address 41.32.117.114 on Port 445(SMB)
2019-09-11 00:05:23
187.18.126.19 attackspam
Jul  9 00:21:42 mercury auth[21903]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=187.18.126.19
...
2019-09-10 23:54:25
200.72.249.139 attackbotsspam
Sep 10 20:01:10 www sshd\[64439\]: Address 200.72.249.139 maps to mail.aminerals.cl, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Sep 10 20:01:10 www sshd\[64439\]: Invalid user pass from 200.72.249.139Sep 10 20:01:12 www sshd\[64439\]: Failed password for invalid user pass from 200.72.249.139 port 35082 ssh2
...
2019-09-11 01:19:57
37.191.152.79 attack
09/10/2019-07:27:01.434179 37.191.152.79 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 29
2019-09-11 00:36:42
222.186.30.59 attack
Sep 10 18:55:39 localhost sshd\[6888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.59  user=root
Sep 10 18:55:41 localhost sshd\[6888\]: Failed password for root from 222.186.30.59 port 14043 ssh2
Sep 10 18:55:43 localhost sshd\[6888\]: Failed password for root from 222.186.30.59 port 14043 ssh2
2019-09-11 01:13:09
160.153.154.2 attackbots
May 24 03:59:05 mercury wordpress(lukegirvin.co.uk)[27423]: XML-RPC authentication failure for luke from 160.153.154.2
...
2019-09-11 01:03:48
181.123.177.204 attack
Sep 10 17:43:40 meumeu sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 
Sep 10 17:43:41 meumeu sshd[1825]: Failed password for invalid user developer from 181.123.177.204 port 42674 ssh2
Sep 10 17:51:23 meumeu sshd[2812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.177.204 
...
2019-09-11 01:21:11

Recently Reported IPs

245.30.111.127 154.249.229.217 76.144.242.46 9.28.150.67
212.85.67.222 16.130.184.196 30.56.247.111 150.212.139.68
246.204.159.23 102.64.83.112 176.108.128.164 142.66.129.37
167.148.234.128 137.137.219.128 213.234.135.139 185.228.131.174
221.142.54.173 115.231.104.180 169.182.132.168 61.167.227.26