Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.132.12.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.132.12.242.			IN	A

;; AUTHORITY SECTION:
.			374	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 03:07:50 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 242.12.132.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
b'242.12.132.6.in-addr.arpa	name = host-6-132-12-242.ptr.eit-v.army.mil.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
222.190.145.130 attack
2020-07-30T14:28[Censored Hostname] sshd[29587]: Invalid user huanminxian from 222.190.145.130 port 33552
2020-07-30T14:28[Censored Hostname] sshd[29587]: Failed password for invalid user huanminxian from 222.190.145.130 port 33552 ssh2
2020-07-30T14:34[Censored Hostname] sshd[323]: Invalid user zyy from 222.190.145.130 port 37682[...]
2020-07-30 21:08:36
163.172.167.225 attack
Failed password for invalid user liuyh from 163.172.167.225 port 46614 ssh2
2020-07-30 21:19:34
200.89.159.52 attackspam
Jul 30 14:20:35 rancher-0 sshd[665471]: Invalid user marmot from 200.89.159.52 port 55336
...
2020-07-30 21:32:26
91.208.99.2 attack
SQL injection attempt.
2020-07-30 21:27:47
222.186.175.163 attackspam
Jul 30 15:44:59 santamaria sshd\[27905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
Jul 30 15:45:01 santamaria sshd\[27905\]: Failed password for root from 222.186.175.163 port 57750 ssh2
Jul 30 15:45:26 santamaria sshd\[27907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.163  user=root
...
2020-07-30 21:47:34
211.193.60.137 attackbotsspam
Jul 30 13:25:53 ip-172-31-61-156 sshd[14373]: Failed password for invalid user lizehan from 211.193.60.137 port 45948 ssh2
Jul 30 13:25:51 ip-172-31-61-156 sshd[14373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.60.137
Jul 30 13:25:51 ip-172-31-61-156 sshd[14373]: Invalid user lizehan from 211.193.60.137
Jul 30 13:25:53 ip-172-31-61-156 sshd[14373]: Failed password for invalid user lizehan from 211.193.60.137 port 45948 ssh2
Jul 30 13:30:18 ip-172-31-61-156 sshd[14674]: Invalid user xxw from 211.193.60.137
...
2020-07-30 21:39:05
113.89.34.216 attackbotsspam
Jul 28 05:04:58 h1637304 sshd[8636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.34.216 
Jul 28 05:04:59 h1637304 sshd[8636]: Failed password for invalid user apiadmin from 113.89.34.216 port 56410 ssh2
Jul 28 05:04:59 h1637304 sshd[8636]: Received disconnect from 113.89.34.216: 11: Bye Bye [preauth]
Jul 28 05:07:19 h1637304 sshd[13219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.34.216 
Jul 28 05:07:21 h1637304 sshd[13219]: Failed password for invalid user satu from 113.89.34.216 port 51724 ssh2
Jul 28 05:07:22 h1637304 sshd[13219]: Received disconnect from 113.89.34.216: 11: Bye Bye [preauth]
Jul 28 05:08:40 h1637304 sshd[13253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.89.34.216 
Jul 28 05:08:42 h1637304 sshd[13253]: Failed password for invalid user weiyut from 113.89.34.216 port 37482 ssh2
Jul 28 05:08:43 h1637304 ........
-------------------------------
2020-07-30 21:38:07
64.227.67.106 attack
Jul 30 15:09:54 nextcloud sshd\[26362\]: Invalid user plex from 64.227.67.106
Jul 30 15:09:54 nextcloud sshd\[26362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.67.106
Jul 30 15:09:57 nextcloud sshd\[26362\]: Failed password for invalid user plex from 64.227.67.106 port 42394 ssh2
2020-07-30 21:25:02
80.211.98.67 attack
2020-07-30T14:51:54.442629sd-86998 sshd[9170]: Invalid user dev from 80.211.98.67 port 41182
2020-07-30T14:51:54.448135sd-86998 sshd[9170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.98.67
2020-07-30T14:51:54.442629sd-86998 sshd[9170]: Invalid user dev from 80.211.98.67 port 41182
2020-07-30T14:51:56.936423sd-86998 sshd[9170]: Failed password for invalid user dev from 80.211.98.67 port 41182 ssh2
2020-07-30T14:55:41.277878sd-86998 sshd[10788]: Invalid user mudesheng from 80.211.98.67 port 52692
...
2020-07-30 21:13:26
222.186.175.151 attack
Jul 30 15:22:09 vps1 sshd[17397]: Failed none for invalid user root from 222.186.175.151 port 7108 ssh2
Jul 30 15:22:09 vps1 sshd[17397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Jul 30 15:22:11 vps1 sshd[17397]: Failed password for invalid user root from 222.186.175.151 port 7108 ssh2
Jul 30 15:22:24 vps1 sshd[17401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Jul 30 15:22:26 vps1 sshd[17401]: Failed password for invalid user root from 222.186.175.151 port 9080 ssh2
Jul 30 15:22:31 vps1 sshd[17401]: Failed password for invalid user root from 222.186.175.151 port 9080 ssh2
Jul 30 15:22:35 vps1 sshd[17401]: Failed password for invalid user root from 222.186.175.151 port 9080 ssh2
Jul 30 15:22:39 vps1 sshd[17401]: Failed password for invalid user root from 222.186.175.151 port 9080 ssh2
...
2020-07-30 21:28:13
52.187.132.240 attackspambots
SSH Brute Force
2020-07-30 21:48:53
176.16.68.22 attack
ICMP MH Probe, Scan /Distributed -
2020-07-30 21:14:15
145.239.154.240 attackbotsspam
Jul 30 18:27:30 gw1 sshd[15669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.154.240
Jul 30 18:27:32 gw1 sshd[15669]: Failed password for invalid user shenhe from 145.239.154.240 port 35500 ssh2
...
2020-07-30 21:39:32
212.68.46.33 attackbots
Jul 30 15:32:14 OPSO sshd\[25407\]: Invalid user zxtenant from 212.68.46.33 port 58956
Jul 30 15:32:14 OPSO sshd\[25407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.46.33
Jul 30 15:32:16 OPSO sshd\[25407\]: Failed password for invalid user zxtenant from 212.68.46.33 port 58956 ssh2
Jul 30 15:36:36 OPSO sshd\[26613\]: Invalid user tssgw from 212.68.46.33 port 41110
Jul 30 15:36:36 OPSO sshd\[26613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.68.46.33
2020-07-30 21:43:44
173.37.151.198 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-07-30 21:36:34

Recently Reported IPs

152.251.188.184 209.60.195.50 172.61.57.130 151.169.192.101
23.32.240.222 106.42.242.230 154.34.41.17 115.20.129.97
142.189.20.153 248.218.134.177 223.192.241.97 164.208.140.179
83.252.248.124 64.162.145.138 132.82.33.184 63.144.218.2
54.196.12.39 125.192.7.189 220.81.142.17 169.251.142.169