Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.2.132.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.2.132.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 16:15:45 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 48.132.2.9.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.132.2.9.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.98.157.126 attackspambots
14.98.157.126 - - [30/Jun/2020:10:29:18 -0600] "GET /wp-login.php HTTP/1.1" 303 433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-01 03:52:46
41.200.140.183 attackspam
$f2bV_matches
2020-07-01 03:55:36
46.101.183.105 attackspambots
firewall-block, port(s): 11440/tcp
2020-07-01 04:32:23
106.52.121.148 attackspambots
$f2bV_matches
2020-07-01 04:34:45
201.31.167.50 attack
2020-06-30T16:06:38.730846ionos.janbro.de sshd[60022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50
2020-06-30T16:06:38.635149ionos.janbro.de sshd[60022]: Invalid user nexus from 201.31.167.50 port 34687
2020-06-30T16:06:40.106470ionos.janbro.de sshd[60022]: Failed password for invalid user nexus from 201.31.167.50 port 34687 ssh2
2020-06-30T16:09:20.777867ionos.janbro.de sshd[60041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50  user=root
2020-06-30T16:09:22.724425ionos.janbro.de sshd[60041]: Failed password for root from 201.31.167.50 port 54512 ssh2
2020-06-30T16:12:04.594012ionos.janbro.de sshd[60049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.31.167.50  user=root
2020-06-30T16:12:06.442900ionos.janbro.de sshd[60049]: Failed password for root from 201.31.167.50 port 46103 ssh2
2020-06-30T16:15:06.204767ionos.janbro.de ss
...
2020-07-01 04:24:35
180.76.103.247 attackspam
2020-06-30T14:17:44+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-01 04:26:30
183.6.159.141 attackspambots
Invalid user tos from 183.6.159.141 port 34516
2020-07-01 04:29:23
185.220.77.4 attackspam
185.220.77.4 - - [30/Jun/2020:14:18:21 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.220.77.4 - - [30/Jun/2020:14:18:22 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.220.77.4 - - [30/Jun/2020:14:18:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-01 03:53:33
173.201.196.102 attack
Automatic report - XMLRPC Attack
2020-07-01 04:05:24
168.128.70.151 attackspam
Jun 30 21:49:34 dhoomketu sshd[1161835]: Invalid user user from 168.128.70.151 port 33906
Jun 30 21:49:34 dhoomketu sshd[1161835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.128.70.151 
Jun 30 21:49:34 dhoomketu sshd[1161835]: Invalid user user from 168.128.70.151 port 33906
Jun 30 21:49:36 dhoomketu sshd[1161835]: Failed password for invalid user user from 168.128.70.151 port 33906 ssh2
Jun 30 21:52:44 dhoomketu sshd[1161897]: Invalid user zimbra from 168.128.70.151 port 33600
...
2020-07-01 04:14:02
178.128.168.87 attackspam
Multiple SSH authentication failures from 178.128.168.87
2020-07-01 03:54:15
146.120.97.41 attackbots
Invalid user web from 146.120.97.41 port 48894
2020-07-01 04:20:48
120.159.40.90 attackbots
(sshd) Failed SSH login from 120.159.40.90 (AU/Australia/cpe-120-159-40-90.dyn.belong.com.au): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 30 13:24:56 grace sshd[19023]: Invalid user 22 from 120.159.40.90 port 36915
Jun 30 13:24:58 grace sshd[19023]: Failed password for invalid user 22 from 120.159.40.90 port 36915 ssh2
Jun 30 13:52:26 grace sshd[23437]: Invalid user webuser from 120.159.40.90 port 49375
Jun 30 13:52:28 grace sshd[23437]: Failed password for invalid user webuser from 120.159.40.90 port 49375 ssh2
Jun 30 14:18:27 grace sshd[27660]: Invalid user sign from 120.159.40.90 port 60924
2020-07-01 03:44:29
189.180.24.119 attackspambots
Jun 30 17:35:54 vps sshd[460175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.24.119  user=root
Jun 30 17:35:56 vps sshd[460175]: Failed password for root from 189.180.24.119 port 41568 ssh2
Jun 30 17:37:57 vps sshd[468748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.180.24.119  user=root
Jun 30 17:37:59 vps sshd[468748]: Failed password for root from 189.180.24.119 port 58078 ssh2
Jun 30 17:40:03 vps sshd[481495]: Invalid user www-data from 189.180.24.119 port 46358
...
2020-07-01 03:51:51
45.55.214.64 attackspambots
$f2bV_matches
2020-07-01 04:19:59

Recently Reported IPs

219.24.194.73 48.77.76.172 191.78.203.154 181.181.9.182
207.130.147.49 52.180.85.130 75.35.63.163 254.33.97.78
181.69.148.48 5.55.12.43 20.21.124.145 119.13.8.232
40.68.117.63 66.226.170.55 70.251.194.73 65.227.73.36
104.136.9.0 205.251.209.229 38.68.82.254 87.50.253.246