Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.194.146.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7299
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.194.146.72.			IN	A

;; AUTHORITY SECTION:
.			268	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 18:58:22 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 72.146.194.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 72.146.194.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.244.43.140 attack
Nov 27 15:33:53 h2177944 kernel: \[7740540.379741\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=12620 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:33:56 h2177944 kernel: \[7740543.418852\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=13225 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:34:02 h2177944 kernel: \[7740549.417818\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=48 TOS=0x00 PREC=0x00 TTL=54 ID=13336 DF PROTO=TCP SPT=59550 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:46:27 h2177944 kernel: \[7741294.073958\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=85.214.117.9 LEN=52 TOS=0x00 PREC=0x00 TTL=54 ID=14502 DF PROTO=TCP SPT=65082 DPT=65530 WINDOW=8192 RES=0x00 SYN URGP=0 
Nov 27 15:46:30 h2177944 kernel: \[7741297.069231\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=14.244.43.140 DST=
2019-11-28 06:00:51
115.77.168.248 attackspambots
Unauthorized connection attempt from IP address 115.77.168.248 on Port 445(SMB)
2019-11-28 06:04:00
177.6.64.162 attack
Unauthorized connection attempt from IP address 177.6.64.162 on Port 445(SMB)
2019-11-28 06:33:15
49.156.149.236 attackspambots
UTC: 2019-11-26 port: 26/tcp
2019-11-28 06:32:13
14.142.111.146 attack
Unauthorized connection attempt from IP address 14.142.111.146 on Port 445(SMB)
2019-11-28 06:05:10
167.99.46.145 attackbots
Tried sshing with brute force.
2019-11-28 06:29:18
120.29.157.253 attack
Unauthorized connection attempt from IP address 120.29.157.253 on Port 445(SMB)
2019-11-28 06:16:53
45.79.152.7 attackspambots
Automatic report - Port Scan
2019-11-28 06:22:43
189.11.63.18 attackspambots
Unauthorized connection attempt from IP address 189.11.63.18 on Port 445(SMB)
2019-11-28 06:02:10
91.105.30.9 attackbots
Unauthorized connection attempt from IP address 91.105.30.9 on Port 445(SMB)
2019-11-28 06:14:35
85.192.134.226 attack
Unauthorized connection attempt from IP address 85.192.134.226 on Port 445(SMB)
2019-11-28 06:14:12
124.65.18.102 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 06:15:21
180.250.108.133 attackspam
Repeated brute force against a port
2019-11-28 06:24:39
112.135.228.47 attackspambots
Unauthorized connection attempt from IP address 112.135.228.47 on Port 445(SMB)
2019-11-28 06:19:38
51.75.195.25 attackspam
SSH Brute Force
2019-11-28 06:26:46

Recently Reported IPs

109.55.30.138 174.128.55.64 159.35.101.251 120.154.221.211
142.115.159.212 156.139.29.41 114.221.161.151 238.148.103.51
153.247.170.23 80.154.110.15 223.98.51.76 124.3.240.179
135.171.19.24 227.90.98.181 102.13.7.149 241.144.44.147
106.0.158.123 150.181.36.237 135.16.176.111 13.190.142.117