Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.21.149.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.21.149.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 07:58:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 86.149.21.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.149.21.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.88.35.194 attackspam
23/tcp
[2020-03-24]1pkt
2020-03-25 06:26:26
122.51.213.140 attackbots
Mar 24 17:18:04 firewall sshd[9846]: Invalid user zhengpinwen from 122.51.213.140
Mar 24 17:18:06 firewall sshd[9846]: Failed password for invalid user zhengpinwen from 122.51.213.140 port 54892 ssh2
Mar 24 17:22:29 firewall sshd[10145]: Invalid user asher from 122.51.213.140
...
2020-03-25 06:19:30
180.76.187.216 attackbots
2020-03-24T15:47:38.724038linuxbox-skyline sshd[7094]: Invalid user kurt from 180.76.187.216 port 47658
...
2020-03-25 05:52:07
112.10.118.130 attackspambots
Attempts against SMTP/SSMTP
2020-03-25 06:07:23
62.2.136.87 attack
Mar 24 21:37:06 ws26vmsma01 sshd[28410]: Failed password for root from 62.2.136.87 port 53068 ssh2
...
2020-03-25 06:16:52
49.234.47.124 attackbots
SSH brute force attempt
2020-03-25 06:04:11
107.170.57.221 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-25 06:03:20
45.89.173.197 attack
SQL Injection Attempts
2020-03-25 06:18:20
93.87.76.172 attackbotsspam
20/3/24@14:29:03: FAIL: Alarm-Network address from=93.87.76.172
...
2020-03-25 05:50:47
157.51.222.241 attack
Chat Spam
2020-03-25 05:59:36
120.92.33.13 attackbots
Mar 24 19:28:42 pornomens sshd\[26839\]: Invalid user ashleigh from 120.92.33.13 port 53080
Mar 24 19:28:42 pornomens sshd\[26839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.33.13
Mar 24 19:28:44 pornomens sshd\[26839\]: Failed password for invalid user ashleigh from 120.92.33.13 port 53080 ssh2
...
2020-03-25 06:00:59
123.206.18.49 attack
2020-03-24T21:52:57.305426abusebot-3.cloudsearch.cf sshd[3072]: Invalid user test from 123.206.18.49 port 56976
2020-03-24T21:52:57.312314abusebot-3.cloudsearch.cf sshd[3072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.18.49
2020-03-24T21:52:57.305426abusebot-3.cloudsearch.cf sshd[3072]: Invalid user test from 123.206.18.49 port 56976
2020-03-24T21:52:58.527215abusebot-3.cloudsearch.cf sshd[3072]: Failed password for invalid user test from 123.206.18.49 port 56976 ssh2
2020-03-24T21:57:18.960608abusebot-3.cloudsearch.cf sshd[3476]: Invalid user kt from 123.206.18.49 port 34342
2020-03-24T21:57:18.966309abusebot-3.cloudsearch.cf sshd[3476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.18.49
2020-03-24T21:57:18.960608abusebot-3.cloudsearch.cf sshd[3476]: Invalid user kt from 123.206.18.49 port 34342
2020-03-24T21:57:20.678039abusebot-3.cloudsearch.cf sshd[3476]: Failed password for inv
...
2020-03-25 06:08:39
157.230.163.6 attackbots
$f2bV_matches
2020-03-25 06:15:46
128.199.91.233 attackbots
2020-03-24T21:52:55.008393vps751288.ovh.net sshd\[4116\]: Invalid user bv from 128.199.91.233 port 55922
2020-03-24T21:52:55.016264vps751288.ovh.net sshd\[4116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.91.233
2020-03-24T21:52:56.407227vps751288.ovh.net sshd\[4116\]: Failed password for invalid user bv from 128.199.91.233 port 55922 ssh2
2020-03-24T21:57:14.549829vps751288.ovh.net sshd\[4172\]: Invalid user hst from 128.199.91.233 port 41684
2020-03-24T21:57:14.555083vps751288.ovh.net sshd\[4172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.91.233
2020-03-25 06:10:59
180.166.114.14 attack
Mar 24 15:24:13 firewall sshd[1182]: Invalid user seiko from 180.166.114.14
Mar 24 15:24:14 firewall sshd[1182]: Failed password for invalid user seiko from 180.166.114.14 port 38464 ssh2
Mar 24 15:28:05 firewall sshd[1500]: Invalid user iz from 180.166.114.14
...
2020-03-25 06:24:19

Recently Reported IPs

96.57.189.47 118.92.186.211 195.180.120.102 172.216.237.132
176.18.247.157 243.106.0.250 205.219.50.177 109.11.249.118
33.26.211.182 12.130.105.70 131.247.34.28 130.116.84.218
135.5.253.193 159.222.242.161 247.0.186.5 204.137.29.153
176.246.174.97 106.43.84.111 252.66.15.226 222.178.54.49