Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.52.138.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.52.138.81.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081401 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 15 08:39:09 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 81.138.52.133.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 81.138.52.133.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.21.32.215 attack
Automatic report - Banned IP Access
2020-07-31 15:05:42
129.226.160.128 attackspam
Invalid user lipr from 129.226.160.128 port 36742
2020-07-31 15:04:38
103.110.84.196 attack
SSH Brute Force
2020-07-31 15:35:42
76.68.154.155 attackbotsspam
Port probing on unauthorized port 23
2020-07-31 15:14:13
134.175.224.105 attackbots
Invalid user shaohua from 134.175.224.105 port 45252
2020-07-31 15:29:03
116.73.24.9 attack
" "
2020-07-31 15:12:01
197.232.53.182 attack
197.232.53.182 - - [31/Jul/2020:09:23:25 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
197.232.53.182 - - [31/Jul/2020:09:29:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 15:36:51
61.55.10.168 attack
Port Scan detected!
...
2020-07-31 15:21:43
185.85.28.161 attack
Attempted connection to port 42178.
2020-07-31 15:17:24
92.53.96.121 attackspambots
Fail2Ban Ban Triggered
2020-07-31 15:39:58
52.17.98.131 attack
21 attempts against mh-misbehave-ban on apple
2020-07-31 15:32:49
218.92.0.171 attackbotsspam
Automatic report BANNED IP
2020-07-31 15:38:53
133.242.155.85 attackbotsspam
Jul 31 07:04:28 game-panel sshd[3036]: Failed password for root from 133.242.155.85 port 54530 ssh2
Jul 31 07:08:44 game-panel sshd[3211]: Failed password for root from 133.242.155.85 port 39340 ssh2
2020-07-31 15:31:52
119.146.150.134 attackspambots
2020-07-31T08:11:39.740449vps773228.ovh.net sshd[26371]: Failed password for root from 119.146.150.134 port 54379 ssh2
2020-07-31T08:13:58.141706vps773228.ovh.net sshd[26411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.150.134  user=root
2020-07-31T08:14:00.421563vps773228.ovh.net sshd[26411]: Failed password for root from 119.146.150.134 port 37468 ssh2
2020-07-31T08:16:10.626113vps773228.ovh.net sshd[26427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.150.134  user=root
2020-07-31T08:16:13.026520vps773228.ovh.net sshd[26427]: Failed password for root from 119.146.150.134 port 48784 ssh2
...
2020-07-31 15:26:45
142.4.16.20 attackspam
SSH Brute Force
2020-07-31 15:30:18

Recently Reported IPs

58.172.87.151 178.102.50.95 111.72.193.45 220.84.137.60
24.101.135.52 197.34.3.141 54.159.111.252 118.174.92.16
32.196.75.145 131.193.36.87 7.86.134.249 20.52.53.215
88.239.4.140 56.104.141.145 42.73.115.38 14.205.15.248
45.94.41.206 2.109.203.119 248.202.125.188 28.162.0.230