Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.130.142.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.130.142.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 07:26:17 CST 2025
;; MSG SIZE  rcvd: 108
Host info
106.142.130.133.in-addr.arpa domain name pointer pl11370.ag0110.nttpc.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.142.130.133.in-addr.arpa	name = pl11370.ag0110.nttpc.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.250.204 attackspam
Hits on port : 28549
2020-04-13 06:57:07
103.253.146.142 attack
firewall-block, port(s): 12702/tcp
2020-04-13 06:43:53
134.175.73.93 attackspambots
SASL PLAIN auth failed: ruser=...
2020-04-13 06:55:03
94.183.118.104 attackbotsspam
4567/tcp 8000/tcp
[2020-03-12/04-12]2pkt
2020-04-13 07:01:50
176.113.115.209 attack
firewall-block, port(s): 3400/tcp
2020-04-13 06:30:52
45.135.50.236 attackbotsspam
SSH invalid-user multiple login try
2020-04-13 06:33:08
109.206.131.223 attackspam
445/tcp 445/tcp
[2020-03-04/04-12]2pkt
2020-04-13 06:34:46
49.68.148.81 attackbots
firewall-block, port(s): 139/tcp
2020-04-13 06:57:52
193.70.36.161 attackspambots
prod3
...
2020-04-13 06:43:23
107.170.20.247 attackbots
Apr 12 22:31:54 rotator sshd\[1064\]: Failed password for root from 107.170.20.247 port 41329 ssh2Apr 12 22:34:39 rotator sshd\[1118\]: Failed password for root from 107.170.20.247 port 33466 ssh2Apr 12 22:37:29 rotator sshd\[1918\]: Invalid user teo from 107.170.20.247Apr 12 22:37:31 rotator sshd\[1918\]: Failed password for invalid user teo from 107.170.20.247 port 53843 ssh2Apr 12 22:40:15 rotator sshd\[2656\]: Invalid user oracle from 107.170.20.247Apr 12 22:40:17 rotator sshd\[2656\]: Failed password for invalid user oracle from 107.170.20.247 port 45993 ssh2
...
2020-04-13 06:29:17
92.84.58.223 attackspam
4567/tcp 4567/tcp
[2020-04-02/12]2pkt
2020-04-13 06:49:35
167.71.128.144 attack
2020-04-12T22:29:05.142158shield sshd\[24630\]: Invalid user administrator from 167.71.128.144 port 55992
2020-04-12T22:29:05.145719shield sshd\[24630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144
2020-04-12T22:29:06.410167shield sshd\[24630\]: Failed password for invalid user administrator from 167.71.128.144 port 55992 ssh2
2020-04-12T22:32:29.397148shield sshd\[25434\]: Invalid user gasiago from 167.71.128.144 port 35218
2020-04-12T22:32:29.400804shield sshd\[25434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.128.144
2020-04-13 06:37:06
125.212.217.214 attack
firewall-block, port(s): 28017/tcp
2020-04-13 06:37:22
89.45.226.116 attackspambots
Invalid user uftp from 89.45.226.116 port 54608
2020-04-13 06:44:36
114.242.117.12 attackspambots
Invalid user peggy from 114.242.117.12 port 41726
2020-04-13 06:37:50

Recently Reported IPs

46.122.223.237 177.71.33.45 16.29.138.246 222.78.225.249
66.229.105.227 175.254.158.92 8.39.60.211 167.224.57.66
143.36.208.50 68.148.242.109 133.248.54.59 150.110.212.121
166.135.217.18 2.89.68.206 96.114.225.48 71.45.132.211
93.48.95.230 84.155.198.29 190.251.73.35 224.209.14.19