Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.70.99.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39777
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.70.99.133.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091400 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Sep 14 21:00:35 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 133.99.70.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.99.70.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.244.110 attack
Jul  8 10:24:11 giegler sshd[10617]: Failed password for invalid user knight from 193.112.244.110 port 55604 ssh2
Jul  8 10:26:16 giegler sshd[10643]: Invalid user ts from 193.112.244.110 port 43090
Jul  8 10:26:16 giegler sshd[10643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.244.110
Jul  8 10:26:16 giegler sshd[10643]: Invalid user ts from 193.112.244.110 port 43090
Jul  8 10:26:18 giegler sshd[10643]: Failed password for invalid user ts from 193.112.244.110 port 43090 ssh2
2019-07-08 18:14:11
151.80.41.124 attack
Jul  8 10:56:40 MK-Soft-Root2 sshd\[28686\]: Invalid user sonar from 151.80.41.124 port 32804
Jul  8 10:56:40 MK-Soft-Root2 sshd\[28686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.41.124
Jul  8 10:56:43 MK-Soft-Root2 sshd\[28686\]: Failed password for invalid user sonar from 151.80.41.124 port 32804 ssh2
...
2019-07-08 18:13:17
81.22.45.133 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-08 18:47:37
143.0.40.219 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 18:38:02
188.17.153.3 attackbotsspam
Lines containing failures of 188.17.153.3
Jul  8 10:14:19 shared11 sshd[3717]: Invalid user admin from 188.17.153.3 port 33340
Jul  8 10:14:19 shared11 sshd[3717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.17.153.3
Jul  8 10:14:21 shared11 sshd[3717]: Failed password for invalid user admin from 188.17.153.3 port 33340 ssh2
Jul  8 10:14:21 shared11 sshd[3717]: Connection closed by invalid user admin 188.17.153.3 port 33340 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.17.153.3
2019-07-08 18:17:18
5.89.10.81 attackspam
Jul  8 02:14:08 typhoon sshd[8921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:14:10 typhoon sshd[8921]: Failed password for invalid user monika from 5.89.10.81 port 48222 ssh2
Jul  8 02:14:10 typhoon sshd[8921]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth]
Jul  8 02:16:45 typhoon sshd[8930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:16:48 typhoon sshd[8930]: Failed password for invalid user ftpuser from 5.89.10.81 port 39316 ssh2
Jul  8 02:16:48 typhoon sshd[8930]: Received disconnect from 5.89.10.81: 11: Bye Bye [preauth]
Jul  8 02:19:05 typhoon sshd[8977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-10-81.cust.vodafonedsl.hostname
Jul  8 02:19:07 typhoon sshd[8977]: Failed password for invalid user ajmal from 5.........
-------------------------------
2019-07-08 18:47:09
103.42.255.81 attack
Jul  8 10:54:05 our-server-hostname postfix/smtpd[16166]: connect from unknown[103.42.255.81]
Jul  8 10:55:43 our-server-hostname postfix/smtpd[16166]: lost connection after MAIL from unknown[103.42.255.81]
Jul  8 10:55:43 our-server-hostname postfix/smtpd[16166]: disconnect from unknown[103.42.255.81]
Jul  8 12:00:27 our-server-hostname postfix/smtpd[12782]: connect from unknown[103.42.255.81]
Jul x@x
Jul x@x
Jul x@x
Jul  8 12:00:33 our-server-hostname postfix/smtpd[12782]: lost connection after RCPT from unknown[103.42.255.81]
Jul  8 12:00:33 our-server-hostname postfix/smtpd[12782]: disconnect from unknown[103.42.255.81]
Jul  8 15:44:25 our-server-hostname postfix/smtpd[15940]: connect from unknown[103.42.255.81]
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul x@x
Jul  8 15:44:45 our-server-hostname postfix/smtpd[15940]: lost connection after RCPT from unknown[103.42.255.81]
Jul  8 15........
-------------------------------
2019-07-08 17:57:11
185.176.26.78 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-08 17:55:32
81.22.45.251 attackbots
firewall-block, port(s): 5900/tcp, 5901/tcp, 5916/tcp, 5925/tcp
2019-07-08 18:39:49
193.32.163.182 attackbotsspam
Jul  8 12:26:14 [munged] sshd[20931]: Invalid user admin from 193.32.163.182 port 34021
Jul  8 12:26:14 [munged] sshd[20931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
2019-07-08 18:46:42
159.65.176.77 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 18:14:48
167.250.218.131 attackspam
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-07-08 17:55:10
60.250.81.38 attackspam
Jul  8 11:31:44 vps691689 sshd[27678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.81.38
Jul  8 11:31:46 vps691689 sshd[27678]: Failed password for invalid user gwen from 60.250.81.38 port 60122 ssh2
Jul  8 11:33:34 vps691689 sshd[27683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.81.38
...
2019-07-08 18:16:59
45.13.39.115 attackbotsspam
Jul  8 12:58:24 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:00:24 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:02:35 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:04:39 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
Jul  8 13:06:43 yabzik postfix/smtpd[2348]: warning: unknown[45.13.39.115]: SASL LOGIN authentication failed: authentication failure
2019-07-08 18:19:32
85.209.0.115 attackspam
Port scan on 9 port(s): 11350 11390 16321 23145 30628 34043 38598 48199 50465
2019-07-08 18:37:00

Recently Reported IPs

104.41.220.133 152.253.168.20 151.38.197.49 151.38.210.197
91.239.26.89 161.35.129.196 94.4.162.197 51.250.98.48
2.57.122.83 188.68.220.190 211.43.201.22 191.97.41.230
101.51.86.71 104.188.155.28 39.72.97.14 175.10.232.24
45.228.52.122 103.173.13.58 200.142.113.230 124.35.233.137