Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.106.49.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56513
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.106.49.132.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 22:36:15 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 132.49.106.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 132.49.106.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.14.226.159 attackspambots
SSH Brute-Forcing (server1)
2020-08-01 12:00:31
106.54.87.169 attackspam
Aug  1 00:51:55 vps46666688 sshd[9350]: Failed password for root from 106.54.87.169 port 52160 ssh2
...
2020-08-01 12:26:48
23.30.221.181 attack
Aug  1 05:58:34 fhem-rasp sshd[24307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.30.221.181  user=root
Aug  1 05:58:37 fhem-rasp sshd[24307]: Failed password for root from 23.30.221.181 port 60505 ssh2
...
2020-08-01 12:03:29
159.89.170.154 attackspam
(sshd) Failed SSH login from 159.89.170.154 (IN/India/-): 5 in the last 3600 secs
2020-08-01 12:29:49
66.70.130.144 attackbots
Invalid user xionghui from 66.70.130.144 port 59026
2020-08-01 12:18:33
199.152.245.87 attackbots
2020-08-01 12:26:25
139.59.147.218 attack
xmlrpc attack
2020-08-01 12:12:46
51.79.44.52 attack
Aug  1 05:54:02 home sshd[657605]: Failed password for root from 51.79.44.52 port 42472 ssh2
Aug  1 05:56:05 home sshd[658277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52  user=root
Aug  1 05:56:07 home sshd[658277]: Failed password for root from 51.79.44.52 port 48882 ssh2
Aug  1 05:58:16 home sshd[659013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.44.52  user=root
Aug  1 05:58:19 home sshd[659013]: Failed password for root from 51.79.44.52 port 55290 ssh2
...
2020-08-01 12:14:43
51.178.51.36 attack
(sshd) Failed SSH login from 51.178.51.36 (FR/France/36.ip-51-178-51.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  1 07:11:03 srv sshd[23839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.36  user=root
Aug  1 07:11:05 srv sshd[23839]: Failed password for root from 51.178.51.36 port 38722 ssh2
Aug  1 07:21:43 srv sshd[24093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.36  user=root
Aug  1 07:21:45 srv sshd[24093]: Failed password for root from 51.178.51.36 port 41760 ssh2
Aug  1 07:25:58 srv sshd[24298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.51.36  user=root
2020-08-01 12:26:08
175.198.83.204 attackspambots
$f2bV_matches
2020-08-01 12:31:13
104.248.16.234 attackbots
Aug  1 09:35:41 lunarastro sshd[12357]: Failed password for root from 104.248.16.234 port 45854 ssh2
2020-08-01 12:30:41
183.83.53.229 attackbots
Automatic report - Banned IP Access
2020-08-01 12:37:28
118.27.4.225 attackbots
$f2bV_matches
2020-08-01 12:29:00
218.92.0.211 attackspambots
(sshd) Failed SSH login from 218.92.0.211 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  1 05:56:58 amsweb01 sshd[19943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
Aug  1 05:57:01 amsweb01 sshd[19943]: Failed password for root from 218.92.0.211 port 35819 ssh2
Aug  1 05:57:03 amsweb01 sshd[19943]: Failed password for root from 218.92.0.211 port 35819 ssh2
Aug  1 05:57:06 amsweb01 sshd[19943]: Failed password for root from 218.92.0.211 port 35819 ssh2
Aug  1 05:58:36 amsweb01 sshd[20208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2020-08-01 12:01:36
222.186.61.19 attackspambots
" "
2020-08-01 12:22:00

Recently Reported IPs

84.58.88.197 5.133.91.43 20.120.241.181 168.29.110.14
166.26.151.37 144.156.69.20 38.200.37.234 232.231.83.24
132.163.76.158 125.157.177.90 53.169.167.7 220.167.130.199
229.194.209.223 38.199.58.168 116.115.187.232 45.130.58.106
21.109.90.122 249.247.208.255 79.79.61.209 232.21.181.67