Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.207.14.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.207.14.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 10:28:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
134.14.207.133.in-addr.arpa domain name pointer flh2-133-207-14-134.osk.mesh.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.14.207.133.in-addr.arpa	name = flh2-133-207-14-134.osk.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.93.242.226 attackbots
2019-11-16T15:13:05.092420shield sshd\[17409\]: Invalid user ubuntu from 111.93.242.226 port 14833
2019-11-16T15:13:05.098258shield sshd\[17409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.242.226
2019-11-16T15:13:07.536398shield sshd\[17409\]: Failed password for invalid user ubuntu from 111.93.242.226 port 14833 ssh2
2019-11-16T15:13:15.259193shield sshd\[17450\]: Invalid user ubuntu from 111.93.242.226 port 7641
2019-11-16T15:13:15.264880shield sshd\[17450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.242.226
2019-11-17 00:24:14
148.72.212.161 attackspam
Nov 16 11:52:44 ws22vmsma01 sshd[91229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.212.161
Nov 16 11:52:46 ws22vmsma01 sshd[91229]: Failed password for invalid user web96p1 from 148.72.212.161 port 41458 ssh2
...
2019-11-17 00:14:40
212.154.86.139 attack
2019-11-16T16:28:36.196033abusebot-8.cloudsearch.cf sshd\[18869\]: Invalid user komaki from 212.154.86.139 port 41784
2019-11-17 00:40:44
103.105.179.189 attackbots
23/tcp
[2019-11-16]1pkt
2019-11-17 00:39:38
202.51.110.214 attack
Nov 16 21:16:47 areeb-Workstation sshd[23092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Nov 16 21:16:49 areeb-Workstation sshd[23092]: Failed password for invalid user gerfrid from 202.51.110.214 port 47909 ssh2
...
2019-11-17 00:01:58
151.80.45.126 attackspambots
Nov 16 16:56:18 MK-Soft-VM5 sshd[29477]: Failed password for root from 151.80.45.126 port 48376 ssh2
...
2019-11-17 00:00:45
118.27.19.120 attackspambots
Nov 16 17:40:26 server sshd\[14989\]: Invalid user drwho from 118.27.19.120
Nov 16 17:40:26 server sshd\[14989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-19-120.cxxt.static.cnode.io 
Nov 16 17:40:28 server sshd\[14989\]: Failed password for invalid user drwho from 118.27.19.120 port 54926 ssh2
Nov 16 17:52:27 server sshd\[18201\]: Invalid user host from 118.27.19.120
Nov 16 17:52:27 server sshd\[18201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-19-120.cxxt.static.cnode.io 
...
2019-11-17 00:29:24
222.32.91.67 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-17 00:11:14
222.186.180.41 attackbots
Nov 16 17:24:07 SilenceServices sshd[29570]: Failed password for root from 222.186.180.41 port 38334 ssh2
Nov 16 17:24:20 SilenceServices sshd[29570]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 38334 ssh2 [preauth]
Nov 16 17:24:27 SilenceServices sshd[29795]: Failed password for root from 222.186.180.41 port 50508 ssh2
2019-11-17 00:27:23
58.37.225.126 attack
Nov 16 16:45:34 sd-53420 sshd\[24952\]: Invalid user norman from 58.37.225.126
Nov 16 16:45:34 sd-53420 sshd\[24952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.37.225.126
Nov 16 16:45:36 sd-53420 sshd\[24952\]: Failed password for invalid user norman from 58.37.225.126 port 23412 ssh2
Nov 16 16:50:11 sd-53420 sshd\[26234\]: User root from 58.37.225.126 not allowed because none of user's groups are listed in AllowGroups
Nov 16 16:50:11 sd-53420 sshd\[26234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.37.225.126  user=root
...
2019-11-17 00:04:03
178.159.249.66 attack
$f2bV_matches
2019-11-17 00:11:37
190.214.76.204 attackspam
60001/tcp
[2019-11-16]1pkt
2019-11-17 00:22:16
217.61.15.38 attackbotsspam
Nov 16 06:17:00 php1 sshd\[2632\]: Invalid user juan from 217.61.15.38
Nov 16 06:17:00 php1 sshd\[2632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.15.38
Nov 16 06:17:02 php1 sshd\[2632\]: Failed password for invalid user juan from 217.61.15.38 port 53848 ssh2
Nov 16 06:20:47 php1 sshd\[2939\]: Invalid user dominic from 217.61.15.38
Nov 16 06:20:47 php1 sshd\[2939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.15.38
2019-11-17 00:23:05
63.88.23.216 attackspambots
63.88.23.216 was recorded 5 times by 4 hosts attempting to connect to the following ports: 80,110. Incident counter (4h, 24h, all-time): 5, 27, 119
2019-11-17 00:15:31
195.64.163.126 attack
23/tcp
[2019-11-16]1pkt
2019-11-17 00:29:51

Recently Reported IPs

212.78.191.182 137.29.23.120 69.217.80.195 193.159.215.141
8.45.220.102 119.202.138.159 33.96.217.164 230.162.216.219
232.120.46.148 172.176.20.47 186.242.135.200 62.136.94.82
41.48.239.219 69.179.247.138 227.67.27.182 117.161.71.171
252.125.129.31 107.197.66.248 9.166.134.159 119.13.175.244