Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.50.195.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.50.195.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:53:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 212.195.50.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.195.50.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.33.119.67 attack
SSH Bruteforce
2019-11-17 21:35:24
212.47.246.150 attackbotsspam
$f2bV_matches
2019-11-17 21:08:02
131.221.80.211 attack
Nov 17 09:24:17 lnxweb61 sshd[9614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.80.211
2019-11-17 21:15:25
106.52.88.211 attackbots
Nov 17 10:49:26 eventyay sshd[26839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211
Nov 17 10:49:28 eventyay sshd[26839]: Failed password for invalid user conti from 106.52.88.211 port 58880 ssh2
Nov 17 10:53:35 eventyay sshd[26891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.88.211
...
2019-11-17 21:09:27
103.242.200.38 attackspam
ssh failed login
2019-11-17 21:37:38
62.234.79.230 attackbots
Automatic report - Banned IP Access
2019-11-17 21:12:13
172.0.252.134 attackspam
Fail2Ban - FTP Abuse Attempt
2019-11-17 21:13:44
37.59.107.100 attackbots
SSH Bruteforce
2019-11-17 21:39:58
184.75.211.132 attackbots
(From musselman.melanie@outlook.com) We're looking for website owners like yourself who want to automate their existing business and make some extra income... Continuous Residual Income and the product practically sells itself on auto pilot. Check out: http://trimurl.co/AutomateAnyBusiness.
2019-11-17 21:18:24
35.165.102.57 attack
SSH Bruteforce
2019-11-17 21:48:40
187.74.158.111 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/187.74.158.111/ 
 
 BR - 1H : (308)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 187.74.158.111 
 
 CIDR : 187.74.0.0/16 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 ATTACKS DETECTED ASN27699 :  
  1H - 7 
  3H - 17 
  6H - 29 
 12H - 52 
 24H - 104 
 
 DateTime : 2019-11-17 07:21:01 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-17 21:32:38
23.101.186.224 attackspambots
Automatic report - XMLRPC Attack
2019-11-17 21:31:03
35.194.140.24 attackbotsspam
SSH Bruteforce
2019-11-17 21:47:11
49.233.51.218 attackspambots
Invalid user 00 from 49.233.51.218 port 50380
2019-11-17 21:08:33
40.73.7.218 attackbotsspam
Nov 17 19:56:09 webhost01 sshd[28107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.7.218
Nov 17 19:56:10 webhost01 sshd[28107]: Failed password for invalid user kahkonen from 40.73.7.218 port 36850 ssh2
...
2019-11-17 21:36:22

Recently Reported IPs

177.221.107.209 238.101.15.171 243.184.8.176 127.201.129.166
66.127.239.51 52.205.137.155 187.243.75.213 123.193.144.247
51.89.64.182 200.24.229.150 202.195.33.11 194.22.164.40
21.91.250.69 23.149.48.154 133.162.251.199 3.251.248.15
173.230.238.18 132.114.110.14 4.238.102.65 199.83.95.61