Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.224.18.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.224.18.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:33:04 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.18.224.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.18.224.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
75.144.73.145 attack
May 22 06:11:47 ns392434 sshd[15283]: Invalid user qdl from 75.144.73.145 port 42584
May 22 06:11:47 ns392434 sshd[15283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.144.73.145
May 22 06:11:47 ns392434 sshd[15283]: Invalid user qdl from 75.144.73.145 port 42584
May 22 06:11:49 ns392434 sshd[15283]: Failed password for invalid user qdl from 75.144.73.145 port 42584 ssh2
May 22 06:26:43 ns392434 sshd[15538]: Invalid user zix from 75.144.73.145 port 41266
May 22 06:26:43 ns392434 sshd[15538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.144.73.145
May 22 06:26:43 ns392434 sshd[15538]: Invalid user zix from 75.144.73.145 port 41266
May 22 06:26:45 ns392434 sshd[15538]: Failed password for invalid user zix from 75.144.73.145 port 41266 ssh2
May 22 06:30:57 ns392434 sshd[15714]: Invalid user xff from 75.144.73.145 port 48538
2020-05-22 14:47:51
182.253.175.60 attack
20/5/22@00:21:06: FAIL: Alarm-Network address from=182.253.175.60
20/5/22@00:21:06: FAIL: Alarm-Network address from=182.253.175.60
...
2020-05-22 14:55:31
223.223.190.131 attackbotsspam
May 22 07:42:01 plex sshd[730]: Invalid user kwn from 223.223.190.131 port 38027
2020-05-22 14:52:13
176.31.255.63 attackspambots
May 22 03:24:36 XXX sshd[25859]: Invalid user dvb from 176.31.255.63 port 34139
2020-05-22 14:53:17
129.211.22.55 attackbots
May 22 06:32:01 DAAP sshd[15401]: Invalid user qhe from 129.211.22.55 port 40102
May 22 06:32:01 DAAP sshd[15401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.22.55
May 22 06:32:01 DAAP sshd[15401]: Invalid user qhe from 129.211.22.55 port 40102
May 22 06:32:03 DAAP sshd[15401]: Failed password for invalid user qhe from 129.211.22.55 port 40102 ssh2
May 22 06:36:38 DAAP sshd[15473]: Invalid user akk from 129.211.22.55 port 35014
...
2020-05-22 15:06:54
217.182.169.183 attack
May 22 08:06:06 server sshd[27491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.169.183
May 22 08:06:08 server sshd[27491]: Failed password for invalid user ppa from 217.182.169.183 port 50178 ssh2
May 22 08:09:37 server sshd[27969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.169.183
...
2020-05-22 14:32:44
117.211.192.70 attack
May 22 13:55:47 localhost sshd[573254]: Invalid user oat from 117.211.192.70 port 37272
...
2020-05-22 14:36:41
180.76.100.33 attack
Invalid user cwd from 180.76.100.33 port 48860
2020-05-22 15:00:20
27.128.168.225 attack
May 22 06:38:36 srv01 sshd[4537]: Invalid user hue from 27.128.168.225 port 39806
May 22 06:38:36 srv01 sshd[4537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.168.225
May 22 06:38:36 srv01 sshd[4537]: Invalid user hue from 27.128.168.225 port 39806
May 22 06:38:38 srv01 sshd[4537]: Failed password for invalid user hue from 27.128.168.225 port 39806 ssh2
May 22 06:42:59 srv01 sshd[5711]: Invalid user ewq from 27.128.168.225 port 40431
...
2020-05-22 14:44:05
190.205.150.15 attackspambots
Unauthorized connection attempt from IP address 190.205.150.15 on Port 445(SMB)
2020-05-22 14:38:55
151.80.60.151 attackspambots
Invalid user bwr from 151.80.60.151 port 53054
2020-05-22 14:42:22
80.211.13.167 attackbotsspam
Invalid user pengliang from 80.211.13.167 port 36756
2020-05-22 15:07:52
222.186.180.147 attack
May 22 06:23:26 localhost sshd[32110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
May 22 06:23:28 localhost sshd[32110]: Failed password for root from 222.186.180.147 port 24232 ssh2
May 22 06:23:31 localhost sshd[32110]: Failed password for root from 222.186.180.147 port 24232 ssh2
May 22 06:23:26 localhost sshd[32110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
May 22 06:23:28 localhost sshd[32110]: Failed password for root from 222.186.180.147 port 24232 ssh2
May 22 06:23:31 localhost sshd[32110]: Failed password for root from 222.186.180.147 port 24232 ssh2
May 22 06:23:26 localhost sshd[32110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
May 22 06:23:28 localhost sshd[32110]: Failed password for root from 222.186.180.147 port 24232 ssh2
May 22 06:23:31 localhost sshd[32
...
2020-05-22 14:44:41
124.158.184.3 attack
Port Scanner
2020-05-22 14:36:00
171.220.243.128 attackspambots
SSH invalid-user multiple login try
2020-05-22 15:00:43

Recently Reported IPs

142.1.67.162 5.228.20.198 98.125.214.3 250.136.214.118
137.127.228.96 42.242.56.14 245.47.248.239 71.192.95.149
224.227.229.212 250.85.71.128 213.246.117.41 3.87.244.104
167.213.136.158 157.1.197.251 159.180.220.106 252.214.180.203
246.118.231.87 222.3.26.150 137.46.69.174 56.203.61.33