Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.52.33.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.52.33.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 173 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 04:46:41 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 213.33.52.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.33.52.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.160.86 attack
Jul 27 07:12:09 vps sshd[171072]: Failed password for invalid user nagios2 from 111.229.160.86 port 53548 ssh2
Jul 27 07:16:19 vps sshd[192243]: Invalid user www from 111.229.160.86 port 40082
Jul 27 07:16:19 vps sshd[192243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.160.86
Jul 27 07:16:21 vps sshd[192243]: Failed password for invalid user www from 111.229.160.86 port 40082 ssh2
Jul 27 07:20:20 vps sshd[211312]: Invalid user xz from 111.229.160.86 port 54836
...
2020-07-27 13:42:54
124.61.214.44 attackspam
2020-07-27T07:55:56.980175mail.standpoint.com.ua sshd[14131]: Invalid user iqc from 124.61.214.44 port 50020
2020-07-27T07:55:56.982853mail.standpoint.com.ua sshd[14131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.61.214.44
2020-07-27T07:55:56.980175mail.standpoint.com.ua sshd[14131]: Invalid user iqc from 124.61.214.44 port 50020
2020-07-27T07:55:58.642482mail.standpoint.com.ua sshd[14131]: Failed password for invalid user iqc from 124.61.214.44 port 50020 ssh2
2020-07-27T07:58:37.180033mail.standpoint.com.ua sshd[14495]: Invalid user gmodserver from 124.61.214.44 port 58788
...
2020-07-27 13:11:23
106.12.207.236 attack
Jul 27 07:00:14 ns381471 sshd[21734]: Failed password for mail from 106.12.207.236 port 57114 ssh2
2020-07-27 13:42:33
117.4.241.135 attackspambots
Jul 27 07:03:59 piServer sshd[11500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.4.241.135 
Jul 27 07:04:01 piServer sshd[11500]: Failed password for invalid user user from 117.4.241.135 port 53599 ssh2
Jul 27 07:08:22 piServer sshd[11903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.4.241.135 
...
2020-07-27 13:20:47
66.96.235.110 attack
Jul 27 07:23:31 journals sshd\[59487\]: Invalid user admin from 66.96.235.110
Jul 27 07:23:31 journals sshd\[59487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.235.110
Jul 27 07:23:32 journals sshd\[59487\]: Failed password for invalid user admin from 66.96.235.110 port 43734 ssh2
Jul 27 07:28:52 journals sshd\[60009\]: Invalid user ftpuser from 66.96.235.110
Jul 27 07:28:52 journals sshd\[60009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.235.110
...
2020-07-27 13:24:20
104.43.203.198 attackbotsspam
Jul 27 06:19:00 vps647732 sshd[30669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.43.203.198
Jul 27 06:19:02 vps647732 sshd[30669]: Failed password for invalid user info3 from 104.43.203.198 port 58738 ssh2
...
2020-07-27 13:36:28
94.176.189.32 attackspambots
SpamScore above: 10.0
2020-07-27 13:45:56
187.36.174.2 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-27 13:32:24
192.227.128.171 attackbots
07/26/2020-23:55:17.165329 192.227.128.171 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-27 13:41:31
66.45.251.150 attackspambots
Unauthorized connection attempt detected from IP address 66.45.251.150 to port 8088 [T]
2020-07-27 13:47:56
83.12.171.68 attack
2020-07-27T04:57:39.808051shield sshd\[9172\]: Invalid user julian from 83.12.171.68 port 17596
2020-07-27T04:57:39.817356shield sshd\[9172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ggp68.internetdsl.tpnet.pl
2020-07-27T04:57:42.293399shield sshd\[9172\]: Failed password for invalid user julian from 83.12.171.68 port 17596 ssh2
2020-07-27T05:02:41.669811shield sshd\[9743\]: Invalid user hexing from 83.12.171.68 port 48669
2020-07-27T05:02:41.679724shield sshd\[9743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ggp68.internetdsl.tpnet.pl
2020-07-27 13:10:55
167.99.96.138 attackspam
Automatic report - Port Scan
2020-07-27 13:27:07
175.138.108.78 attack
$f2bV_matches
2020-07-27 13:20:12
177.87.154.2 attackspam
Jul 27 06:59:33 h2779839 sshd[11027]: Invalid user lch from 177.87.154.2 port 37072
Jul 27 06:59:33 h2779839 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.87.154.2
Jul 27 06:59:33 h2779839 sshd[11027]: Invalid user lch from 177.87.154.2 port 37072
Jul 27 06:59:36 h2779839 sshd[11027]: Failed password for invalid user lch from 177.87.154.2 port 37072 ssh2
Jul 27 07:03:13 h2779839 sshd[11115]: Invalid user matt from 177.87.154.2 port 60276
Jul 27 07:03:13 h2779839 sshd[11115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.87.154.2
Jul 27 07:03:13 h2779839 sshd[11115]: Invalid user matt from 177.87.154.2 port 60276
Jul 27 07:03:15 h2779839 sshd[11115]: Failed password for invalid user matt from 177.87.154.2 port 60276 ssh2
Jul 27 07:06:50 h2779839 sshd[11152]: Invalid user gb from 177.87.154.2 port 55216
...
2020-07-27 13:35:17
178.93.212.41 attack
Unauthorized connection attempt detected from IP address 178.93.212.41 to port 23
2020-07-27 13:35:57

Recently Reported IPs

43.167.78.193 151.230.204.231 45.60.132.54 140.179.90.121
141.12.221.135 87.124.242.155 217.111.119.39 149.150.36.93
218.35.222.130 254.101.240.102 113.87.66.56 187.62.208.103
21.10.195.194 144.106.31.102 190.162.117.97 25.99.29.234
24.154.254.59 144.197.36.196 181.230.161.19 123.118.248.128