Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.28.137.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.28.137.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:48:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
138.137.28.133.in-addr.arpa domain name pointer 133-28-137-138.ptr.kanazawa-u.ac.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.137.28.133.in-addr.arpa	name = 133-28-137-138.ptr.kanazawa-u.ac.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.47.159.138 attackbotsspam
Invalid user kcv from 201.47.159.138 port 39510
2020-03-30 08:35:51
186.105.160.119 attack
Invalid user btt from 186.105.160.119 port 32788
2020-03-30 08:38:30
80.211.78.82 attackspam
Mar 30 02:27:57 vps sshd[16090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82 
Mar 30 02:27:59 vps sshd[16090]: Failed password for invalid user znn from 80.211.78.82 port 36254 ssh2
Mar 30 02:33:47 vps sshd[16416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.78.82 
...
2020-03-30 08:51:19
78.42.135.89 attack
Ssh brute force
2020-03-30 08:52:09
104.248.138.95 attack
$f2bV_matches
2020-03-30 08:50:30
195.211.61.252 attackspam
Invalid user ubt from 195.211.61.252 port 47802
2020-03-30 08:36:16
14.29.214.91 attack
Invalid user vuf from 14.29.214.91 port 48560
2020-03-30 08:57:45
216.209.43.253 attack
Invalid user mmx from 216.209.43.253 port 41808
2020-03-30 08:58:43
220.149.231.165 attackbots
3 failed attempts at connecting to SSH.
2020-03-30 08:33:34
104.45.144.234 attackspam
Invalid user kfk from 104.45.144.234 port 34912
2020-03-30 08:50:52
187.110.235.242 attackspambots
Invalid user xzo from 187.110.235.242 port 35566
2020-03-30 08:37:36
49.234.236.174 attackspambots
SSH Brute Force
2020-03-30 08:54:28
106.12.82.136 attackspambots
Invalid user command from 106.12.82.136 port 33082
2020-03-30 08:50:14
218.78.36.159 attack
Mar 30 00:40:20 host sshd[28114]: Invalid user vub from 218.78.36.159 port 38292
...
2020-03-30 08:34:15
27.115.62.134 attackbotsspam
Invalid user cax from 27.115.62.134 port 17885
2020-03-30 08:32:30

Recently Reported IPs

157.4.231.193 139.242.217.118 225.162.159.39 133.140.24.119
31.176.177.68 222.224.75.60 194.114.196.53 209.50.52.121
181.209.36.111 236.30.193.239 82.130.113.188 68.78.225.92
34.75.40.149 191.57.66.209 55.149.2.37 135.63.120.95
21.31.243.75 242.225.114.237 60.28.240.228 181.204.159.98