Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.28.197.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58314
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.28.197.220.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 09 08:56:54 CST 2019
;; MSG SIZE  rcvd: 118
Host info
220.197.28.133.in-addr.arpa domain name pointer 133-28-197-220.ptr.kanazawa-u.ac.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
220.197.28.133.in-addr.arpa	name = 133-28-197-220.ptr.kanazawa-u.ac.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.212.215 attackbots
Oct 21 16:15:34 mail sshd[4427]: Invalid user contact from 14.63.212.215 port 52808
Oct 21 16:15:34 mail sshd[4427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215
Oct 21 16:15:36 mail sshd[4427]: Failed password for invalid user contact from 14.63.212.215 port 52808 ssh2
Oct 21 16:20:17 mail sshd[4445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.212.215  user=r.r
Oct 21 16:20:19 mail sshd[4445]: Failed password for r.r from 14.63.212.215 port 44320 ssh2
Oct 21 16:25:04 mail sshd[4464]: Invalid user bamboo from 14.63.212.215 port 35820

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.63.212.215
2019-10-26 15:22:08
67.215.255.158 attackbots
Brute force attack to crack SMTP password (port 25 / 587)
2019-10-26 14:57:31
51.38.237.214 attackbots
Invalid user sandeep from 51.38.237.214 port 47108
2019-10-26 15:13:14
220.169.58.163 attack
1433/tcp 1433/tcp
[2019-10-22/26]2pkt
2019-10-26 14:51:55
148.72.207.248 attackbots
2019-10-26T06:24:22.911078shield sshd\[23542\]: Invalid user !@qwaszx from 148.72.207.248 port 50998
2019-10-26T06:24:22.915582shield sshd\[23542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-207-248.ip.secureserver.net
2019-10-26T06:24:24.819152shield sshd\[23542\]: Failed password for invalid user !@qwaszx from 148.72.207.248 port 50998 ssh2
2019-10-26T06:28:52.763550shield sshd\[24174\]: Invalid user P@rola123456 from 148.72.207.248 port 33066
2019-10-26T06:28:52.769774shield sshd\[24174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-207-248.ip.secureserver.net
2019-10-26 14:44:36
169.197.108.170 attackbots
8080/tcp 999/tcp 10000/tcp...
[2019-08-27/10-26]4pkt,3pt.(tcp)
2019-10-26 14:42:46
122.152.210.200 attack
Oct 26 08:59:22 MK-Soft-VM3 sshd[14559]: Failed password for root from 122.152.210.200 port 35456 ssh2
...
2019-10-26 15:05:23
220.247.224.53 attackbotsspam
445/tcp 445/tcp
[2019-10-21/26]2pkt
2019-10-26 15:10:42
158.69.223.91 attack
Oct 26 07:31:41 dedicated sshd[3641]: Invalid user abran from 158.69.223.91 port 44002
2019-10-26 15:13:33
114.34.224.196 attackspam
Invalid user riley from 114.34.224.196 port 33668
2019-10-26 15:11:39
45.136.110.40 attackbotsspam
firewall-block, port(s): 1976/tcp, 1983/tcp, 1990/tcp, 1997/tcp, 3406/tcp, 3411/tcp, 3548/tcp, 3939/tcp, 3999/tcp, 5536/tcp, 5540/tcp, 6669/tcp, 8189/tcp, 8282/tcp, 8890/tcp, 8989/tcp, 9978/tcp, 9991/tcp, 12000/tcp, 20400/tcp, 30001/tcp, 30400/tcp, 40700/tcp, 43000/tcp
2019-10-26 15:07:43
183.96.13.8 attackspam
23/tcp 81/tcp
[2019-10-22/26]2pkt
2019-10-26 15:12:44
157.245.33.194 attackbotsspam
firewall-block, port(s): 32754/tcp
2019-10-26 14:55:27
177.204.215.187 attackspambots
23/tcp
[2019-10-26]1pkt
2019-10-26 15:17:38
187.171.183.209 attackspam
8080/tcp
[2019-10-26]1pkt
2019-10-26 15:19:02

Recently Reported IPs

134.104.206.116 106.25.237.6 20.120.176.151 92.9.11.93
182.61.59.143 167.71.255.124 129.220.139.209 89.165.51.121
218.68.204.18 15.51.49.239 187.227.45.182 54.92.162.208
36.57.32.152 196.235.79.21 120.199.140.226 87.174.240.105
77.227.240.201 193.164.131.49 198.48.206.87 190.218.116.84