Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.76.122.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.76.122.139.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 06:39:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 139.122.76.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.122.76.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.167.2 attackbotsspam
"fail2ban match"
2020-04-22 02:20:22
130.61.55.202 attackbotsspam
Invalid user mongo from 130.61.55.202 port 51465
2020-04-22 02:21:50
167.71.83.6 attackspam
Apr 21 19:59:09 srv206 sshd[29470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.83.6  user=root
Apr 21 19:59:11 srv206 sshd[29470]: Failed password for root from 167.71.83.6 port 45454 ssh2
Apr 21 20:03:51 srv206 sshd[29537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.83.6  user=root
Apr 21 20:03:53 srv206 sshd[29537]: Failed password for root from 167.71.83.6 port 35568 ssh2
...
2020-04-22 02:16:49
170.84.209.222 attack
Invalid user do from 170.84.209.222 port 60946
2020-04-22 02:16:24
177.69.237.54 attack
SSH Brute Force
2020-04-22 02:12:32
194.105.205.42 attackspambots
leo_www
2020-04-22 02:04:25
150.223.13.155 attackspam
Invalid user postgres from 150.223.13.155 port 56998
2020-04-22 02:19:30
129.226.174.139 attackspambots
Invalid user oracle from 129.226.174.139 port 49708
2020-04-22 02:22:10
175.139.201.205 attackspambots
Invalid user admin from 175.139.201.205 port 48382
2020-04-22 02:14:23
113.162.181.149 attack
Invalid user admin from 113.162.181.149 port 36837
2020-04-22 02:32:41
122.114.167.42 attack
Invalid user admin2 from 122.114.167.42 port 60856
2020-04-22 02:25:48
200.129.102.38 attackbotsspam
Invalid user jd from 200.129.102.38 port 51552
2020-04-22 02:03:16
203.63.75.248 attackbotsspam
Invalid user ubuntu2 from 203.63.75.248 port 38564
2020-04-22 02:00:29
193.112.125.249 attackbots
Invalid user t from 193.112.125.249 port 55596
2020-04-22 02:04:51
112.196.97.85 attackspam
Apr 21 17:14:22 XXX sshd[50276]: Invalid user xn from 112.196.97.85 port 49884
2020-04-22 02:33:32

Recently Reported IPs

140.50.160.42 123.177.194.193 9.158.176.225 79.74.178.211
140.67.142.229 196.230.96.179 2.142.185.155 232.169.160.177
9.47.59.77 183.217.3.85 123.154.220.14 123.174.18.0
125.48.65.151 24.177.130.96 252.30.184.23 238.58.120.231
221.170.119.109 254.134.80.122 226.231.94.190 222.253.169.114