Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.83.120.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.83.120.140.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121400 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 14 20:31:51 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 140.120.83.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 140.120.83.133.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
165.22.251.90 attackspam
Sep 13 11:34:52 kapalua sshd\[28573\]: Invalid user P@ssw0rd from 165.22.251.90
Sep 13 11:34:52 kapalua sshd\[28573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.90
Sep 13 11:34:54 kapalua sshd\[28573\]: Failed password for invalid user P@ssw0rd from 165.22.251.90 port 56746 ssh2
Sep 13 11:41:04 kapalua sshd\[29316\]: Invalid user P@ssw0rd from 165.22.251.90
Sep 13 11:41:04 kapalua sshd\[29316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.90
2019-09-14 05:49:28
106.53.94.190 attackbotsspam
Sep 13 21:19:05 hb sshd\[26998\]: Invalid user web1 from 106.53.94.190
Sep 13 21:19:05 hb sshd\[26998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.94.190
Sep 13 21:19:07 hb sshd\[26998\]: Failed password for invalid user web1 from 106.53.94.190 port 49474 ssh2
Sep 13 21:23:22 hb sshd\[27367\]: Invalid user demo1 from 106.53.94.190
Sep 13 21:23:22 hb sshd\[27367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.94.190
2019-09-14 05:36:00
185.234.218.229 attackbotsspam
Postfix DNSBL listed. Trying to send SPAM.
2019-09-14 06:01:19
222.186.15.110 attackspambots
Reported by AbuseIPDB proxy server.
2019-09-14 05:31:47
111.62.12.169 attackbotsspam
Sep 13 23:40:41 meumeu sshd[25483]: Failed password for root from 111.62.12.169 port 63386 ssh2
Sep 13 23:44:56 meumeu sshd[25996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.62.12.169 
Sep 13 23:44:58 meumeu sshd[25996]: Failed password for invalid user usuario from 111.62.12.169 port 42852 ssh2
...
2019-09-14 05:46:54
95.216.157.224 attackbots
Read all pages from the web server
2019-09-14 05:28:37
222.186.180.19 attackspambots
Sep 13 16:39:36 aat-srv002 sshd[24515]: Failed password for root from 222.186.180.19 port 1894 ssh2
Sep 13 16:39:45 aat-srv002 sshd[24515]: Failed password for root from 222.186.180.19 port 1894 ssh2
Sep 13 16:39:49 aat-srv002 sshd[24515]: Failed password for root from 222.186.180.19 port 1894 ssh2
Sep 13 16:39:52 aat-srv002 sshd[24515]: Failed password for root from 222.186.180.19 port 1894 ssh2
Sep 13 16:39:52 aat-srv002 sshd[24515]: error: maximum authentication attempts exceeded for root from 222.186.180.19 port 1894 ssh2 [preauth]
...
2019-09-14 05:54:51
92.118.161.21 attack
Automatic report - Port Scan Attack
2019-09-14 05:31:21
178.34.190.39 attackspambots
Sep 14 03:19:11 areeb-Workstation sshd[5461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.34.190.39
Sep 14 03:19:13 areeb-Workstation sshd[5461]: Failed password for invalid user test2 from 178.34.190.39 port 47334 ssh2
...
2019-09-14 06:04:43
80.82.64.127 attackspam
Port scan on 14 port(s): 1042 1094 1138 1139 1534 1618 1844 1847 1867 1879 1897 1912 1947 1966
2019-09-14 05:55:34
49.88.112.113 attack
Sep 13 11:21:47 eddieflores sshd\[10556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 13 11:21:49 eddieflores sshd\[10556\]: Failed password for root from 49.88.112.113 port 53353 ssh2
Sep 13 11:22:37 eddieflores sshd\[10632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 13 11:22:40 eddieflores sshd\[10632\]: Failed password for root from 49.88.112.113 port 48348 ssh2
Sep 13 11:23:32 eddieflores sshd\[10694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-09-14 05:29:38
162.247.74.206 attackbotsspam
Sep 13 11:22:32 kapalua sshd\[27280\]: Invalid user aaron from 162.247.74.206
Sep 13 11:22:32 kapalua sshd\[27280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rosaluxemburg.tor-exit.calyxinstitute.org
Sep 13 11:22:34 kapalua sshd\[27280\]: Failed password for invalid user aaron from 162.247.74.206 port 33732 ssh2
Sep 13 11:22:37 kapalua sshd\[27280\]: Failed password for invalid user aaron from 162.247.74.206 port 33732 ssh2
Sep 13 11:22:39 kapalua sshd\[27280\]: Failed password for invalid user aaron from 162.247.74.206 port 33732 ssh2
2019-09-14 05:59:54
117.215.39.156 attack
Unauthorised access (Sep 14) SRC=117.215.39.156 LEN=40 TOS=0x08 TTL=50 ID=13277 TCP DPT=23 WINDOW=51703 SYN
2019-09-14 05:33:00
106.12.36.42 attackspambots
Sep 13 23:18:29 vps691689 sshd[22806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.36.42
Sep 13 23:18:31 vps691689 sshd[22806]: Failed password for invalid user webmaster from 106.12.36.42 port 46740 ssh2
...
2019-09-14 05:27:34
195.14.114.62 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-09-14 05:24:39

Recently Reported IPs

179.176.246.89 178.128.208.219 184.141.156.47 78.139.216.117
37.137.227.48 0.252.145.161 246.173.192.237 216.145.126.24
232.239.72.43 42.51.85.172 43.248.189.24 15.21.69.137
121.133.168.79 172.190.143.221 30.223.200.134 213.19.28.11
30.67.218.219 53.89.95.112 241.232.176.49 192.209.55.106