Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Suita

Region: Osaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.1.21.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47227
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.1.21.56.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:26:02 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 56.21.1.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.21.1.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.54.144.161 attackspambots
Sep 10 21:58:27 ny01 sshd[18846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.54.144.161
Sep 10 21:58:29 ny01 sshd[18846]: Failed password for invalid user student from 84.54.144.161 port 49978 ssh2
Sep 10 22:04:09 ny01 sshd[19876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.54.144.161
2019-09-11 10:11:12
51.81.20.167 attack
Sep 10 20:33:26 plusreed sshd[3248]: Invalid user telnet from 51.81.20.167
Sep 10 20:33:26 plusreed sshd[3248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.81.20.167
Sep 10 20:33:26 plusreed sshd[3248]: Invalid user telnet from 51.81.20.167
Sep 10 20:33:28 plusreed sshd[3248]: Failed password for invalid user telnet from 51.81.20.167 port 33658 ssh2
...
2019-09-11 10:04:29
110.138.150.111 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 18:01:30,910 INFO [amun_request_handler] PortScan Detected on Port: 445 (110.138.150.111)
2019-09-11 09:46:07
189.213.233.34 attackbots
Sep 10 23:42:21 kmh-mb-001 sshd[5428]: Invalid user teamspeak from 189.213.233.34 port 49309
Sep 10 23:42:21 kmh-mb-001 sshd[5428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.213.233.34
Sep 10 23:42:23 kmh-mb-001 sshd[5428]: Failed password for invalid user teamspeak from 189.213.233.34 port 49309 ssh2
Sep 10 23:42:23 kmh-mb-001 sshd[5428]: Received disconnect from 189.213.233.34 port 49309:11: Bye Bye [preauth]
Sep 10 23:42:23 kmh-mb-001 sshd[5428]: Disconnected from 189.213.233.34 port 49309 [preauth]
Sep 10 23:56:31 kmh-mb-001 sshd[5855]: Invalid user admin from 189.213.233.34 port 60841
Sep 10 23:56:31 kmh-mb-001 sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.213.233.34
Sep 10 23:56:33 kmh-mb-001 sshd[5855]: Failed password for invalid user admin from 189.213.233.34 port 60841 ssh2
Sep 10 23:56:33 kmh-mb-001 sshd[5855]: Received disconnect from 189.213.233.34 po........
-------------------------------
2019-09-11 10:13:28
121.8.142.250 attack
Sep 10 23:07:33 hcbbdb sshd\[12383\]: Invalid user marry from 121.8.142.250
Sep 10 23:07:33 hcbbdb sshd\[12383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.142.250
Sep 10 23:07:34 hcbbdb sshd\[12383\]: Failed password for invalid user marry from 121.8.142.250 port 49086 ssh2
Sep 10 23:10:26 hcbbdb sshd\[12709\]: Invalid user roman from 121.8.142.250
Sep 10 23:10:26 hcbbdb sshd\[12709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.142.250
2019-09-11 09:32:57
189.19.127.29 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 18:01:15,197 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.19.127.29)
2019-09-11 09:51:53
202.125.53.68 attackspam
Sep 10 15:51:18 friendsofhawaii sshd\[20477\]: Invalid user ftpuser from 202.125.53.68
Sep 10 15:51:19 friendsofhawaii sshd\[20477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=u068.d053125202.ctt.ne.jp
Sep 10 15:51:21 friendsofhawaii sshd\[20477\]: Failed password for invalid user ftpuser from 202.125.53.68 port 50321 ssh2
Sep 10 15:58:19 friendsofhawaii sshd\[21116\]: Invalid user sinusbot from 202.125.53.68
Sep 10 15:58:19 friendsofhawaii sshd\[21116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=u068.d053125202.ctt.ne.jp
2019-09-11 10:14:37
148.70.35.109 attack
Sep 11 01:49:29 game-panel sshd[23018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.35.109
Sep 11 01:49:32 game-panel sshd[23018]: Failed password for invalid user webadmin from 148.70.35.109 port 56906 ssh2
Sep 11 01:57:34 game-panel sshd[23386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.35.109
2019-09-11 10:16:16
77.28.160.140 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-10 18:01:40,066 INFO [amun_request_handler] PortScan Detected on Port: 445 (77.28.160.140)
2019-09-11 09:30:04
122.246.240.116 attackbots
Sep 10 17:59:56 eola postfix/smtpd[9639]: connect from unknown[122.246.240.116]
Sep 10 17:59:56 eola postfix/smtpd[9637]: connect from unknown[122.246.240.116]
Sep 10 17:59:56 eola postfix/smtpd[9639]: lost connection after AUTH from unknown[122.246.240.116]
Sep 10 17:59:56 eola postfix/smtpd[9639]: disconnect from unknown[122.246.240.116] ehlo=1 auth=0/1 commands=1/2
Sep 10 17:59:56 eola postfix/smtpd[9637]: lost connection after CONNECT from unknown[122.246.240.116]
Sep 10 17:59:56 eola postfix/smtpd[9637]: disconnect from unknown[122.246.240.116] commands=0/0
Sep 10 17:59:56 eola postfix/smtpd[9639]: connect from unknown[122.246.240.116]
Sep 10 17:59:57 eola postfix/smtpd[9639]: lost connection after AUTH from unknown[122.246.240.116]
Sep 10 17:59:57 eola postfix/smtpd[9639]: disconnect from unknown[122.246.240.116] ehlo=1 auth=0/1 commands=1/2
Sep 10 17:59:57 eola postfix/smtpd[9637]: connect from unknown[122.246.240.116]
Sep 10 17:59:58 eola postfix/smtpd[9637]: lo........
-------------------------------
2019-09-11 09:34:33
192.99.7.71 attack
Sep 11 03:18:10 SilenceServices sshd[8255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.7.71
Sep 11 03:18:12 SilenceServices sshd[8255]: Failed password for invalid user uftp from 192.99.7.71 port 42212 ssh2
Sep 11 03:23:34 SilenceServices sshd[12229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.7.71
2019-09-11 09:32:06
47.254.147.170 attack
Sep 10 21:13:07 ny01 sshd[9088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.147.170
Sep 10 21:13:10 ny01 sshd[9088]: Failed password for invalid user hadoop from 47.254.147.170 port 47174 ssh2
Sep 10 21:17:41 ny01 sshd[9926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.254.147.170
2019-09-11 09:33:24
183.111.120.166 attackspambots
Sep  9 09:46:15 sanyalnet-awsem3-1 sshd[32289]: Connection from 183.111.120.166 port 39332 on 172.30.0.184 port 22
Sep  9 09:46:17 sanyalnet-awsem3-1 sshd[32289]: Invalid user admin from 183.111.120.166
Sep  9 09:46:17 sanyalnet-awsem3-1 sshd[32289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.120.166 
Sep  9 09:46:20 sanyalnet-awsem3-1 sshd[32289]: Failed password for invalid user admin from 183.111.120.166 port 39332 ssh2
Sep  9 09:46:20 sanyalnet-awsem3-1 sshd[32289]: Received disconnect from 183.111.120.166: 11: Bye Bye [preauth]
Sep  9 09:58:45 sanyalnet-awsem3-1 sshd[305]: Connection from 183.111.120.166 port 57992 on 172.30.0.184 port 22
Sep  9 09:58:47 sanyalnet-awsem3-1 sshd[305]: Invalid user nagios from 183.111.120.166
Sep  9 09:58:47 sanyalnet-awsem3-1 sshd[305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.120.166 


........
-----------------------------------------------
https://www.blocklist.
2019-09-11 10:13:54
117.50.20.112 attack
Sep 10 18:08:19 xtremcommunity sshd\[202892\]: Invalid user support from 117.50.20.112 port 50524
Sep 10 18:08:19 xtremcommunity sshd\[202892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.20.112
Sep 10 18:08:21 xtremcommunity sshd\[202892\]: Failed password for invalid user support from 117.50.20.112 port 50524 ssh2
Sep 10 18:11:38 xtremcommunity sshd\[203020\]: Invalid user vagrant from 117.50.20.112 port 54916
Sep 10 18:11:38 xtremcommunity sshd\[203020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.20.112
...
2019-09-11 10:15:13
62.234.156.120 attackspambots
Sep 11 03:23:13 icinga sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.120
Sep 11 03:23:14 icinga sshd[18941]: Failed password for invalid user passw0rd from 62.234.156.120 port 50090 ssh2
...
2019-09-11 09:51:22

Recently Reported IPs

35.226.37.72 97.167.191.187 6.233.119.238 255.251.199.135
47.202.105.119 129.5.47.244 85.119.168.200 115.253.8.9
59.115.244.25 160.39.130.25 249.212.77.9 99.38.59.191
154.246.40.244 206.44.35.111 165.102.229.226 163.119.247.241
240.96.160.118 89.16.3.196 104.228.191.71 20.20.248.219