Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.50.205.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.50.205.133.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 21:36:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 133.205.50.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.205.50.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.175.169 attackbotsspam
Feb1711:34:29server6sshd[12719]:refusedconnectfrom222.186.175.169\(222.186.175.169\)Feb1711:34:29server6sshd[12720]:refusedconnectfrom222.186.175.169\(222.186.175.169\)Feb1711:34:30server6sshd[12721]:refusedconnectfrom222.186.175.169\(222.186.175.169\)Feb1711:34:30server6sshd[12722]:refusedconnectfrom222.186.175.169\(222.186.175.169\)Feb1711:48:46server6sshd[13817]:refusedconnectfrom222.186.175.169\(222.186.175.169\)
2020-02-17 18:50:08
201.149.20.162 attackbots
*Port Scan* detected from 201.149.20.162 (MX/Mexico/162.20.149.201.in-addr.arpa). 4 hits in the last 10 seconds
2020-02-17 18:55:14
220.135.151.75 attack
DATE:2020-02-17 05:56:03, IP:220.135.151.75, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-02-17 18:31:37
123.252.197.74 attack
1581915352 - 02/17/2020 05:55:52 Host: 123.252.197.74/123.252.197.74 Port: 445 TCP Blocked
2020-02-17 18:45:40
138.68.92.121 attackbotsspam
Feb 17 11:44:23 srv-ubuntu-dev3 sshd[8520]: Invalid user p@ssword from 138.68.92.121
Feb 17 11:44:23 srv-ubuntu-dev3 sshd[8520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121
Feb 17 11:44:23 srv-ubuntu-dev3 sshd[8520]: Invalid user p@ssword from 138.68.92.121
Feb 17 11:44:25 srv-ubuntu-dev3 sshd[8520]: Failed password for invalid user p@ssword from 138.68.92.121 port 47996 ssh2
Feb 17 11:47:17 srv-ubuntu-dev3 sshd[8769]: Invalid user pim123 from 138.68.92.121
Feb 17 11:47:17 srv-ubuntu-dev3 sshd[8769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121
Feb 17 11:47:17 srv-ubuntu-dev3 sshd[8769]: Invalid user pim123 from 138.68.92.121
Feb 17 11:47:19 srv-ubuntu-dev3 sshd[8769]: Failed password for invalid user pim123 from 138.68.92.121 port 49200 ssh2
Feb 17 11:50:19 srv-ubuntu-dev3 sshd[9039]: Invalid user 321 from 138.68.92.121
...
2020-02-17 18:56:13
52.64.15.110 attackbots
Feb 17 05:22:41 ws19vmsma01 sshd[122175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.64.15.110
Feb 17 05:22:42 ws19vmsma01 sshd[122175]: Failed password for invalid user thursday from 52.64.15.110 port 46212 ssh2
...
2020-02-17 18:39:38
128.199.179.123 attackbots
k+ssh-bruteforce
2020-02-17 18:49:28
147.30.91.77 attack
1581915358 - 02/17/2020 05:55:58 Host: 147.30.91.77/147.30.91.77 Port: 445 TCP Blocked
2020-02-17 18:40:25
62.36.20.20 attackbotsspam
SSH login attempts.
2020-02-17 18:27:33
104.47.58.33 attack
SSH login attempts.
2020-02-17 18:54:42
183.15.90.83 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-17 18:38:00
196.218.146.91 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 18:37:43
178.236.234.20 attack
02/17/2020-05:56:07.245295 178.236.234.20 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-02-17 18:26:36
196.246.210.124 attackbotsspam
Brute force attempt
2020-02-17 18:24:51
104.47.45.33 attackspam
SSH login attempts.
2020-02-17 18:53:04

Recently Reported IPs

69.132.219.38 95.124.206.34 14.63.1.134 25.21.186.188
252.3.12.151 137.56.29.165 37.193.182.142 164.170.251.104
234.2.219.133 95.82.5.2 4.206.226.120 172.66.20.35
56.168.62.217 80.35.166.112 13.107.249.31 144.249.165.28
106.92.3.44 220.72.39.117 108.90.238.55 248.217.218.223