Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rowlett

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.5.130.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33471
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.5.130.133.			IN	A

;; AUTHORITY SECTION:
.			2152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082000 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 21 00:42:42 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 133.130.5.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 133.130.5.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.206.216.18 attackspam
proto=tcp  .  spt=34205  .  dpt=25  .     (listed on Blocklist de  Jul 22)     (40)
2019-07-23 15:39:14
159.65.135.11 attack
Jul 23 02:07:07 aat-srv002 sshd[3353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.135.11
Jul 23 02:07:10 aat-srv002 sshd[3353]: Failed password for invalid user shark from 159.65.135.11 port 33956 ssh2
Jul 23 02:13:58 aat-srv002 sshd[3516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.135.11
Jul 23 02:14:00 aat-srv002 sshd[3516]: Failed password for invalid user paul from 159.65.135.11 port 50146 ssh2
...
2019-07-23 15:24:32
37.59.46.85 attack
Jul 23 08:59:35 microserver sshd[34464]: Invalid user hq from 37.59.46.85 port 48752
Jul 23 08:59:35 microserver sshd[34464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.46.85
Jul 23 08:59:38 microserver sshd[34464]: Failed password for invalid user hq from 37.59.46.85 port 48752 ssh2
Jul 23 09:04:08 microserver sshd[35099]: Invalid user view from 37.59.46.85 port 46066
Jul 23 09:04:08 microserver sshd[35099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.46.85
Jul 23 09:17:29 microserver sshd[36958]: Invalid user linda from 37.59.46.85 port 40826
Jul 23 09:17:29 microserver sshd[36958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.46.85
Jul 23 09:17:30 microserver sshd[36958]: Failed password for invalid user linda from 37.59.46.85 port 40826 ssh2
Jul 23 09:21:59 microserver sshd[37570]: Invalid user online from 37.59.46.85 port 39412
Jul 23 09:21:59 microserver s
2019-07-23 16:00:44
220.243.178.123 attackspambots
Jul 22 14:02:36 xb0 sshd[6914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.243.178.123  user=r.r
Jul 22 14:02:38 xb0 sshd[6914]: Failed password for r.r from 220.243.178.123 port 45562 ssh2
Jul 22 14:02:38 xb0 sshd[6914]: Received disconnect from 220.243.178.123: 11: Normal Shutdown, Thank you for playing [preauth]
Jul 22 14:02:43 xb0 sshd[6991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.243.178.123  user=r.r
Jul 22 14:02:45 xb0 sshd[6991]: Failed password for r.r from 220.243.178.123 port 47002 ssh2
Jul 22 14:02:45 xb0 sshd[6991]: Received disconnect from 220.243.178.123: 11: Normal Shutdown, Thank you for playing [preauth]
Jul 22 14:02:48 xb0 sshd[7095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.243.178.123  user=r.r
Jul 22 14:02:51 xb0 sshd[7095]: Failed password for r.r from 220.243.178.123 port 50842 ssh2
Jul 22 14:02:........
-------------------------------
2019-07-23 15:23:36
41.76.246.254 attackbots
email spam
2019-07-23 15:34:24
162.243.46.161 attackspambots
Jul 22 18:21:01 risk sshd[20203]: Invalid user ward from 162.243.46.161
Jul 22 18:21:01 risk sshd[20203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161 
Jul 22 18:21:04 risk sshd[20203]: Failed password for invalid user ward from 162.243.46.161 port 59058 ssh2
Jul 22 18:31:28 risk sshd[20448]: Did not receive identification string from 162.243.46.161
Jul 22 18:36:15 risk sshd[20562]: Invalid user installer from 162.243.46.161
Jul 22 18:36:15 risk sshd[20562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161 
Jul 22 18:36:17 risk sshd[20562]: Failed password for invalid user installer from 162.243.46.161 port 40450 ssh2
Jul 22 18:40:37 risk sshd[20675]: Invalid user alberto from 162.243.46.161
Jul 22 18:40:37 risk sshd[20675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.46.161 
Jul 22 18:40:39 risk sshd[20675]:........
-------------------------------
2019-07-23 16:33:20
85.105.128.131 attackbotsspam
Automatic report - Port Scan Attack
2019-07-23 15:32:55
185.234.217.41 attackbots
This IP address was blacklisted for the following reason:  / @ 2019-07-23T03:39:05+02:00.
2019-07-23 15:20:53
41.226.24.21 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-07-23 16:30:35
51.75.52.134 attackspambots
2019-07-23T07:02:15.155077abusebot-6.cloudsearch.cf sshd\[1196\]: Invalid user ericsson from 51.75.52.134 port 54290
2019-07-23 15:27:01
171.235.199.238 attackspambots
60001/tcp
[2019-07-22]1pkt
2019-07-23 15:43:00
165.227.194.61 attackspam
19/7/22@19:14:05: FAIL: IoT-Telnet address from=165.227.194.61
...
2019-07-23 15:59:13
80.104.202.234 attack
Brute force attempt
2019-07-23 16:29:56
95.95.221.68 attack
20 attempts against mh-ssh on sand.magehost.pro
2019-07-23 15:46:54
189.8.68.41 attack
xmlrpc attack
2019-07-23 15:25:47

Recently Reported IPs

83.97.159.118 118.205.223.151 111.15.30.8 18.176.149.127
217.169.153.214 124.74.119.158 15.178.34.180 70.160.156.169
32.16.208.80 203.78.188.184 176.65.215.148 183.215.72.92
201.68.134.181 1.171.185.107 93.4.10.152 185.225.236.249
162.241.211.234 139.216.200.30 52.47.132.159 137.61.17.161