Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Takayama

Region: Gifu

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.207.197.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.207.197.213.		IN	A

;; AUTHORITY SECTION:
.			572	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031401 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 15 06:00:30 CST 2020
;; MSG SIZE  rcvd: 119
Host info
213.197.207.133.in-addr.arpa domain name pointer flh2-133-207-197-213.osk.mesh.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.197.207.133.in-addr.arpa	name = flh2-133-207-197-213.osk.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.193 attackspam
Port 37777 access denied
2020-01-23 14:13:33
27.71.225.25 attackspambots
Unauthorized connection attempt detected from IP address 27.71.225.25 to port 2220 [J]
2020-01-23 14:22:19
210.249.92.244 attackbots
Unauthorized connection attempt detected from IP address 210.249.92.244 to port 2220 [J]
2020-01-23 14:54:37
122.165.140.147 attack
Invalid user ads from 122.165.140.147 port 35510
2020-01-23 14:29:30
101.109.146.192 attack
Jan 23 04:17:09 dcd-gentoo sshd[5427]: Invalid user any from 101.109.146.192 port 55822
Jan 23 04:17:10 dcd-gentoo sshd[5433]: Invalid user any from 101.109.146.192 port 55947
Jan 23 04:17:12 dcd-gentoo sshd[5436]: Invalid user any from 101.109.146.192 port 56136
...
2020-01-23 15:09:46
109.184.231.128 attackbots
Unauthorized connection attempt from IP address 109.184.231.128 on Port 445(SMB)
2020-01-23 14:07:34
201.242.157.151 attackspambots
1579713284 - 01/22/2020 18:14:44 Host: 201.242.157.151/201.242.157.151 Port: 445 TCP Blocked
2020-01-23 14:28:59
151.61.4.94 attack
Unauthorized connection attempt detected from IP address 151.61.4.94 to port 2220 [J]
2020-01-23 14:47:44
185.209.0.32 attack
ET DROP Dshield Block Listed Source group 1 - port: 5050 proto: TCP cat: Misc Attack
2020-01-23 14:56:42
198.108.67.37 attackbots
Portscan or hack attempt detected by psad/fwsnort
2020-01-23 14:18:53
141.237.28.143 attackbotsspam
Telnet Server BruteForce Attack
2020-01-23 14:59:40
205.185.113.140 attackbots
Invalid user user1 from 205.185.113.140 port 33004
2020-01-23 14:51:45
218.92.0.200 attack
Jan 23 07:23:29 legacy sshd[6063]: Failed password for root from 218.92.0.200 port 25648 ssh2
Jan 23 07:24:11 legacy sshd[6077]: Failed password for root from 218.92.0.200 port 64864 ssh2
...
2020-01-23 14:25:46
218.92.0.138 attack
Unauthorized connection attempt detected from IP address 218.92.0.138 to port 22 [J]
2020-01-23 14:59:23
138.197.33.113 attack
Unauthorized connection attempt detected from IP address 138.197.33.113 to port 2220 [J]
2020-01-23 14:49:35

Recently Reported IPs

107.17.20.19 179.252.185.76 158.101.146.159 89.141.204.2
187.0.232.145 194.90.202.112 189.201.174.189 151.10.14.176
5.78.110.69 35.25.14.15 71.58.118.125 88.109.216.110
59.12.99.149 161.207.125.242 32.132.147.47 38.117.18.192
41.146.126.120 210.153.215.229 185.83.195.214 124.163.201.241