Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nova Laranjeiras

Region: Parana

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.137.133.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;143.137.133.14.			IN	A

;; AUTHORITY SECTION:
.			261	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081802 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 19 07:46:59 CST 2020
;; MSG SIZE  rcvd: 118
Host info
14.133.137.143.in-addr.arpa domain name pointer 143-137-133-14.dlinternet.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.133.137.143.in-addr.arpa	name = 143-137-133-14.dlinternet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.70.226.162 attackbotsspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-07-05 19:27:24
219.225.93.24 attackspambots
Unauthorized connection attempt from IP address 219.225.93.24 on Port 445(SMB)
2019-07-05 19:11:18
190.200.39.9 attack
firewall-block, port(s): 22/tcp
2019-07-05 19:26:56
198.100.146.132 attackspambots
Automatic report - Web App Attack
2019-07-05 18:59:00
138.68.20.158 attackbotsspam
Jul  5 10:58:28 vpn01 sshd\[20265\]: Invalid user trading from 138.68.20.158
Jul  5 10:58:28 vpn01 sshd\[20265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.20.158
Jul  5 10:58:30 vpn01 sshd\[20265\]: Failed password for invalid user trading from 138.68.20.158 port 35416 ssh2
2019-07-05 19:34:39
45.82.153.4 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-05 19:13:53
121.168.248.218 attackspam
Jul  5 11:02:22 MK-Soft-Root2 sshd\[14474\]: Invalid user lm from 121.168.248.218 port 53478
Jul  5 11:02:22 MK-Soft-Root2 sshd\[14474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.168.248.218
Jul  5 11:02:24 MK-Soft-Root2 sshd\[14474\]: Failed password for invalid user lm from 121.168.248.218 port 53478 ssh2
...
2019-07-05 18:56:03
1.54.209.221 attackspam
Unauthorized connection attempt from IP address 1.54.209.221 on Port 445(SMB)
2019-07-05 19:24:10
139.199.6.107 attackspambots
Automated report - ssh fail2ban:
Jul 5 11:40:23 authentication failure 
Jul 5 11:40:25 wrong password, user=user, port=50002, ssh2
Jul 5 12:10:52 authentication failure
2019-07-05 19:10:12
49.204.226.244 attack
Unauthorized connection attempt from IP address 49.204.226.244 on Port 445(SMB)
2019-07-05 19:30:52
101.227.59.50 attackbots
3389BruteforceFW21
2019-07-05 19:39:37
184.82.189.140 attack
Unauthorized connection attempt from IP address 184.82.189.140 on Port 445(SMB)
2019-07-05 19:35:23
52.76.222.0 attack
Scanning and Vuln Attempts
2019-07-05 19:36:16
45.55.12.248 attack
Jul  5 09:57:33 MK-Soft-VM4 sshd\[23068\]: Invalid user leo from 45.55.12.248 port 54124
Jul  5 09:57:33 MK-Soft-VM4 sshd\[23068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.12.248
Jul  5 09:57:35 MK-Soft-VM4 sshd\[23068\]: Failed password for invalid user leo from 45.55.12.248 port 54124 ssh2
...
2019-07-05 19:00:18
167.99.161.15 attackbots
Jul  5 10:15:09 Ubuntu-1404-trusty-64-minimal sshd\[19845\]: Invalid user anca from 167.99.161.15
Jul  5 10:15:09 Ubuntu-1404-trusty-64-minimal sshd\[19845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.161.15
Jul  5 10:15:11 Ubuntu-1404-trusty-64-minimal sshd\[19845\]: Failed password for invalid user anca from 167.99.161.15 port 60524 ssh2
Jul  5 13:26:01 Ubuntu-1404-trusty-64-minimal sshd\[1463\]: Invalid user vps from 167.99.161.15
Jul  5 13:26:01 Ubuntu-1404-trusty-64-minimal sshd\[1463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.161.15
2019-07-05 19:41:54

Recently Reported IPs

189.160.148.160 68.214.203.240 189.20.176.121 31.50.246.146
12.152.4.252 15.229.69.126 91.231.246.153 32.129.140.89
121.60.139.49 227.177.29.97 95.185.159.97 181.12.247.117
80.113.154.189 86.110.43.238 179.233.214.100 180.14.92.182
167.176.36.59 61.31.236.19 159.179.90.15 165.115.40.175