Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.252.188.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29311
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.252.188.133.		IN	A

;; AUTHORITY SECTION:
.			77	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022042002 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 21 11:03:56 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 133.188.252.122.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.188.252.122.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.248.219.11 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-08-07 03:15:57
165.227.159.16 attackbots
SSH Bruteforce
2019-08-07 03:39:53
151.80.238.201 attack
Aug  6 18:07:08  postfix/smtpd: warning: unknown[151.80.238.201]: SASL LOGIN authentication failed
2019-08-07 03:25:07
46.105.122.127 attack
SSH Brute-Force reported by Fail2Ban
2019-08-07 03:08:35
106.42.189.168 attackbotsspam
Rude login attack (4 tries in 1d)
2019-08-07 03:17:39
147.135.209.139 attackspam
Aug  6 20:31:28 XXX sshd[13794]: Invalid user lara from 147.135.209.139 port 47030
2019-08-07 03:47:51
91.121.157.15 attack
DATE:2019-08-06 16:45:08, IP:91.121.157.15, PORT:ssh SSH brute force auth (ermes)
2019-08-07 03:10:57
39.48.151.64 attackbots
Automatic report - Port Scan Attack
2019-08-07 03:44:51
41.141.250.244 attackspam
Aug  6 21:57:42 hosting sshd[12238]: Invalid user eli from 41.141.250.244 port 53982
Aug  6 21:57:42 hosting sshd[12238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.141.250.244
Aug  6 21:57:42 hosting sshd[12238]: Invalid user eli from 41.141.250.244 port 53982
Aug  6 21:57:44 hosting sshd[12238]: Failed password for invalid user eli from 41.141.250.244 port 53982 ssh2
Aug  6 22:11:16 hosting sshd[13253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.141.250.244  user=root
Aug  6 22:11:18 hosting sshd[13253]: Failed password for root from 41.141.250.244 port 34066 ssh2
...
2019-08-07 03:18:00
159.65.128.166 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-08-07 03:24:38
109.184.155.205 attackspam
Automatic report - Banned IP Access
2019-08-07 03:16:38
124.91.185.161 attackbots
Telnet Server BruteForce Attack
2019-08-07 03:10:37
196.218.37.194 attackspam
Automatic report - Port Scan Attack
2019-08-07 03:35:34
5.107.94.47 attackbots
SS5,WP GET /wp-login.php
2019-08-07 02:55:57
49.88.112.69 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
Failed password for root from 49.88.112.69 port 17104 ssh2
Failed password for root from 49.88.112.69 port 17104 ssh2
Failed password for root from 49.88.112.69 port 17104 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2019-08-07 03:39:29

Recently Reported IPs

161.201.23.48 125.79.103.84 238.109.38.64 225.88.54.163
104.17.93.1 117.196.25.169 194.182.54.7 230.10.215.244
93.34.230.205 2.252.11.80 246.20.235.151 43.254.217.218
200.96.62.89 192.124.40.18 132.40.26.6 176.194.102.43
44.102.235.84 229.133.12.0 27.106.85.157 77.40.115.109