Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.132.170.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.132.170.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 11:12:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 113.170.132.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.132.170.113.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.200.118.40 attackbots
185.200.118.40 was recorded 8 times by 8 hosts attempting to connect to the following ports: 1194. Incident counter (4h, 24h, all-time): 8, 8, 354
2020-04-01 08:50:17
110.54.232.159 attack
Brute force SMTP login attempted.
...
2020-04-01 08:28:01
190.233.58.225 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2020-04-01 08:29:36
110.44.123.47 attack
Brute force SMTP login attempted.
...
2020-04-01 08:39:04
115.150.208.205 attack
Attack,Port Scan
2020-04-01 08:32:04
92.63.194.95 attackspambots
Mar 31 00:20:10 XXX sshd[4514]: Invalid user guest from 92.63.194.95 port 46753
2020-04-01 08:55:25
110.49.71.248 attackspambots
Brute force SMTP login attempted.
...
2020-04-01 08:31:39
68.183.193.148 attackbots
Apr  1 00:24:06 pve sshd[20675]: Failed password for root from 68.183.193.148 port 59586 ssh2
Apr  1 00:27:23 pve sshd[22534]: Failed password for root from 68.183.193.148 port 36310 ssh2
2020-04-01 08:33:32
220.133.18.137 attackspam
Apr  1 01:55:46 icinga sshd[13794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.18.137 
Apr  1 01:55:48 icinga sshd[13794]: Failed password for invalid user test from 220.133.18.137 port 39972 ssh2
Apr  1 02:03:01 icinga sshd[25704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.18.137 
...
2020-04-01 08:57:22
103.146.202.14 attack
scan z
2020-04-01 08:37:41
128.199.128.215 attackbots
Mar 31 23:30:15 icinga sshd[39613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.128.215 
Mar 31 23:30:17 icinga sshd[39613]: Failed password for invalid user lxj from 128.199.128.215 port 45408 ssh2
Mar 31 23:47:27 icinga sshd[367]: Failed password for root from 128.199.128.215 port 46102 ssh2
...
2020-04-01 08:30:00
110.188.70.99 attack
Brute force SMTP login attempted.
...
2020-04-01 08:59:31
110.39.163.235 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-01 08:45:41
167.114.185.237 attackspambots
Invalid user zd from 167.114.185.237 port 55836
2020-04-01 08:36:13
121.135.205.200 attackspambots
srv.marc-hoffrichter.de:80 121.135.205.200 - - [31/Mar/2020:23:29:01 +0200] "GET / HTTP/1.0" 400 0 "-" "-"
2020-04-01 08:54:31

Recently Reported IPs

130.128.120.83 17.84.24.186 221.70.74.142 174.104.190.103
33.91.50.145 92.148.29.246 134.81.93.42 188.174.236.198
22.242.175.231 245.182.7.207 85.51.28.169 162.131.235.155
58.230.2.85 54.109.119.174 162.225.219.224 233.151.32.175
96.36.233.139 145.55.156.54 110.4.237.28 51.2.180.252