IP address


.108132.145.125.232
Shodan(more info)
Passive DNS
Tags: Login attempts
IP blacklists
blocklist.de FTP
132.145.125.232 is listed on the blocklist.de FTP blacklist.

Description: Blocklist.de feed is a free and voluntary service<br>provided by a Fraud/Abuse-specialist. IPs performing attacks<br>on the Service FTP.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-26 17:05:00.091000
Was present on blacklist at: 2026-02-24 17:05, 2026-02-25 17:05, 2026-02-25 23:05, 2026-02-26 05:05, 2026-02-26 11:05, 2026-02-26 17:05
blocklist.de SSH
132.145.125.232 is listed on the blocklist.de SSH blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing SSH attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-05 23:05:00.189000
Was present on blacklist at: 2026-02-24 23:05, 2026-02-25 05:05, 2026-02-25 11:05, 2026-02-27 11:05, 2026-02-27 17:05, 2026-02-27 23:05, 2026-02-28 05:05, 2026-02-28 11:05, 2026-02-28 17:05, 2026-02-28 23:05, 2026-03-01 05:05, 2026-03-01 11:05, 2026-03-01 17:05, 2026-03-01 23:05, 2026-03-02 05:05, 2026-03-02 11:05, 2026-03-02 17:05, 2026-03-02 23:05, 2026-03-03 05:05, 2026-03-03 11:05, 2026-03-03 17:05, 2026-03-03 23:05, 2026-03-04 05:05, 2026-03-04 11:05, 2026-03-04 17:05, 2026-03-04 23:05, 2026-03-05 05:05, 2026-03-05 11:05, 2026-03-05 17:05, 2026-03-05 23:05
blocklist.de web-login
132.145.125.232 is listed on the blocklist.de web-login blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs that attacks Joomla, Wordpress and<br>other Web-Logins with Brute-Force Logins.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-27 05:05:00.077000
Was present on blacklist at: 2026-02-26 23:05, 2026-02-27 05:05
blocklist.de Apache
132.145.125.232 is listed on the blocklist.de Apache blacklist.

Description: Blocklist.de feed is a free and voluntary service provided<br>by a Fraud/Abuse-specialist. IPs performing attacks on the service<br>Apache, Apache-DDOS, RFI-Attacks.
Type of feed: primary (feed detail page)

Last checked at: 2026-02-27 05:05:05.128000
Was present on blacklist at: 2026-02-26 23:05, 2026-02-27 05:05
DataPlane SSH conn
132.145.125.232 is listed on the DataPlane SSH conn blacklist.

Description: DataPlane.org is a community-powered Internet data, feeds,<br>and measurement resource for operators, by operators. IP addresses that<br>has been seen initiating an unsolicited SSH connection to a remote host.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-04 07:10:01.894000
Was present on blacklist at: 2026-02-28 03:10, 2026-02-28 07:10, 2026-02-28 15:10, 2026-02-28 19:10, 2026-03-01 03:10, 2026-03-01 07:10, 2026-03-01 15:10, 2026-03-01 19:10, 2026-03-02 03:10, 2026-03-02 07:10, 2026-03-02 11:10, 2026-03-02 15:10, 2026-03-02 19:10, 2026-03-02 23:10, 2026-03-03 03:10, 2026-03-03 07:10, 2026-03-03 11:10, 2026-03-03 15:10, 2026-03-03 19:10, 2026-03-04 03:10, 2026-03-04 07:10
AbuseIPDB
132.145.125.232 is listed on the AbuseIPDB blacklist.

Description: AbuseIPDB is a project managed by Marathon Studios Inc.<br>Lists IPs performing a malicious activity (DDoS, spam, phishing...)
Type of feed: primary (feed detail page)

Last checked at: 2026-03-05 05:00:00.613000
Was present on blacklist at: 2026-02-28 05:00, 2026-03-01 05:00, 2026-03-02 05:00, 2026-03-04 05:00, 2026-03-05 05:00
UCEPROTECT L1
132.145.125.232 is listed on the UCEPROTECT L1 blacklist.

Description: UCEPROTECT-NETWORK list of spam IPs.
Type of feed: primary (feed detail page)

Last checked at: 2026-03-06 00:45:00.890000
Was present on blacklist at: 2026-03-02 08:45, 2026-03-02 16:45, 2026-03-03 00:45, 2026-03-03 08:45, 2026-03-03 16:45, 2026-03-04 00:45, 2026-03-04 08:45, 2026-03-04 16:45, 2026-03-05 00:45, 2026-03-05 08:45, 2026-03-05 16:45, 2026-03-06 00:45
Spamhaus XBL CBL
132.145.125.232 is listed on the Spamhaus XBL CBL blacklist.

Description: The Spamhaus Exploits Block List (XBL) is a realtime database of IP addresses of hijacked PCs infected by illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits.
Type of feed: secondary (DNSBL) (feed detail page)

Last checked at: 2026-03-03 17:05:52.011000
Was present on blacklist at: 2026-03-03 17:05

Threat categories

TLRoleCategoryDetails
57 src login protocol: ssh
50 src scan
32 src

Warden events (13)
2026-03-04
AttemptLogin (node.c26a5f): 7
2026-03-01
AttemptLogin (node.70e749): 6
DShield reports (IP summary, reports)
2026-02-24
Number of reports: 189
Distinct targets: 12
2026-02-25
Number of reports: 189
Distinct targets: 12
2026-02-26
Number of reports: 476
Distinct targets: 38
2026-02-27
Number of reports: 230
Distinct targets: 18
2026-02-28
Number of reports: 398
Distinct targets: 23
2026-03-01
Number of reports: 145
Distinct targets: 15
2026-03-02
Number of reports: 102
Distinct targets: 12
2026-03-03
Number of reports: 122
Distinct targets: 9
2026-03-04
Number of reports: 141
Distinct targets: 13
Origin AS
AS31898 - ORACLE-BMC-31898
BGP Prefix
132.145.120.0/21
geo
Japan, Inzai
🕑 Asia/Tokyo
hostname
(null)
Address block ('inetnum' or 'NetRange' in whois database)
132.145.0.0 - 132.145.255.255
last_activity
2026-03-04 22:45:19.837000
last_warden_event
2026-03-04 22:45:19.837000
rep
0.10829613095238096
reserved_range
0
Shodan's InternetDB
Open ports: 443
Tags: cloud, self-signed
CPEs:
ts_added
2026-02-24 17:05:44.207000
ts_last_update
2026-03-06 00:54:34.568000

Warden event timeline

DShield event timeline

Presence on blacklists