Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.137.219.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.137.219.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:19:34 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 132.219.137.6.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 6.137.219.132.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
109.123.117.252 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 19:10:32
128.199.84.201 attackspam
$f2bV_matches
2020-10-08 19:24:36
86.96.249.162 attack
Oct 7 22:40:43 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=86.96.249.162 DST=79.143.186.54 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=25774 DF PROTO=TCP SPT=24534 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 Oct 7 22:40:46 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=86.96.249.162 DST=79.143.186.54 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=25775 DF PROTO=TCP SPT=24534 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 Oct 7 22:40:52 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=86.96.249.162 DST=79.143.186.54 LEN=48 TOS=0x00 PREC=0x00 TTL=56 ID=25776 DF PROTO=TCP SPT=24534 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-10-08 19:17:45
138.255.148.35 attackspam
$f2bV_matches
2020-10-08 19:18:01
162.243.128.251 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 19:23:40
128.199.109.128 attackspam
Oct  8 11:31:46 melroy-server sshd[18683]: Failed password for root from 128.199.109.128 port 43565 ssh2
...
2020-10-08 19:45:07
109.244.96.201 attackbotsspam
Found on   CINS badguys     / proto=6  .  srcport=42041  .  dstport=8678  .     (697)
2020-10-08 19:44:46
167.99.110.179 attack
sshd: Failed password for .... from 167.99.110.179 port 52296 ssh2 (8 attempts)
2020-10-08 19:10:59
137.250.3.18 attackbotsspam
2020-10-08T01:31:25.694025matrix.arvenenaske.de sshd[214215]: Failed password for r.r from 137.250.3.18 port 51306 ssh2
2020-10-08T01:34:41.632111matrix.arvenenaske.de sshd[214237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.250.3.18  user=r.r
2020-10-08T01:34:43.881406matrix.arvenenaske.de sshd[214237]: Failed password for r.r from 137.250.3.18 port 57982 ssh2
2020-10-08T01:38:09.852813matrix.arvenenaske.de sshd[214255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.250.3.18  user=r.r
2020-10-08T01:38:11.655630matrix.arvenenaske.de sshd[214255]: Failed password for r.r from 137.250.3.18 port 36460 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=137.250.3.18
2020-10-08 19:44:33
1.28.224.144 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-08 19:35:01
5.24.6.129 attackbots
Port Scan: TCP/443
2020-10-08 19:47:50
27.68.168.87 attack
IP 27.68.168.87 attacked honeypot on port: 23 at 10/8/2020 2:52:01 AM
2020-10-08 19:13:20
104.237.233.113 attack
104.237.233.113 - - [08/Oct/2020:14:57:56 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-10-08 19:15:58
61.143.152.3 attack
IP 61.143.152.3 attacked honeypot on port: 1433 at 10/7/2020 1:39:54 PM
2020-10-08 19:40:38
61.143.152.4 attackbots
IP 61.143.152.4 attacked honeypot on port: 1433 at 10/7/2020 1:39:56 PM
2020-10-08 19:38:16

Recently Reported IPs

203.81.21.136 120.197.48.82 15.240.174.2 96.161.151.214
37.233.29.0 227.82.201.178 253.154.74.164 127.80.85.63
180.221.127.24 205.51.199.192 21.221.35.1 59.77.111.255
61.218.36.15 65.231.173.156 237.108.159.9 68.39.175.161
21.115.171.251 235.130.13.32 34.80.122.107 125.170.212.252