Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Atlanta

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.97.133.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.97.133.214.			IN	A

;; AUTHORITY SECTION:
.			367	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022111200 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 12 18:38:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 214.133.97.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.133.97.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.143.222.107 spam
[2020/02/17 15:47:35] [45.143.222.107:2100-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:37] [45.143.222.107:2101-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:38] [45.143.222.107:2101-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:40] [45.143.222.107:2100-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[2020/02/17 15:47:52] [45.143.222.107:2095-0] User luxnet@luxnetcorp.com.tw AUTH fails.
[
2020-02-17 16:45:18
106.13.223.160 attackspambots
Fail2Ban Ban Triggered
2020-02-17 16:53:09
203.113.243.36 attackbots
SSH login attempts.
2020-02-17 16:53:37
98.244.101.201 attackbots
Feb 16 20:33:50 auw2 sshd\[952\]: Invalid user health from 98.244.101.201
Feb 16 20:33:50 auw2 sshd\[952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-244-101-201.hsd1.va.comcast.net
Feb 16 20:33:52 auw2 sshd\[952\]: Failed password for invalid user health from 98.244.101.201 port 36976 ssh2
Feb 16 20:36:33 auw2 sshd\[1200\]: Invalid user project from 98.244.101.201
Feb 16 20:36:33 auw2 sshd\[1200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-98-244-101-201.hsd1.va.comcast.net
2020-02-17 17:00:07
40.90.190.194 attackbots
Automatic report - XMLRPC Attack
2020-02-17 16:20:56
134.209.147.198 attack
2020-02-16T23:47:38.4242681495-001 sshd[36184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198
2020-02-16T23:47:38.4157031495-001 sshd[36184]: Invalid user liwei from 134.209.147.198 port 43034
2020-02-16T23:47:40.7405751495-001 sshd[36184]: Failed password for invalid user liwei from 134.209.147.198 port 43034 ssh2
2020-02-17T00:48:58.3146281495-001 sshd[39588]: Invalid user taniac from 134.209.147.198 port 51234
2020-02-17T00:48:58.3183821495-001 sshd[39588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198
2020-02-17T00:48:58.3146281495-001 sshd[39588]: Invalid user taniac from 134.209.147.198 port 51234
2020-02-17T00:49:00.8301901495-001 sshd[39588]: Failed password for invalid user taniac from 134.209.147.198 port 51234 ssh2
2020-02-17T00:50:34.0486661495-001 sshd[39659]: Invalid user bind from 134.209.147.198 port 50642
2020-02-17T00:50:34.0572331495-001 sshd[39659]: pa
...
2020-02-17 16:51:09
52.71.85.236 attackspambots
SSH login attempts.
2020-02-17 16:38:39
172.81.237.219 attackbots
Feb 17 05:57:32 dev sshd\[32489\]: Invalid user userftp from 172.81.237.219 port 49364
Feb 17 05:57:32 dev sshd\[32489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.237.219
Feb 17 05:57:34 dev sshd\[32489\]: Failed password for invalid user userftp from 172.81.237.219 port 49364 ssh2
2020-02-17 16:29:23
141.98.80.71 attackspambots
Feb 17 01:51:55 firewall sshd[4421]: Invalid user admin from 141.98.80.71
Feb 17 01:51:57 firewall sshd[4421]: Failed password for invalid user admin from 141.98.80.71 port 60178 ssh2
Feb 17 01:57:36 firewall sshd[4633]: Invalid user admin from 141.98.80.71
...
2020-02-17 16:26:55
109.236.91.85 attackbots
SSH login attempts.
2020-02-17 16:31:01
183.129.159.242 attack
111 packets to ports 21 22 37 49 69 70 88 102 110 111 123 161 177 443 465 502 515 520 523 554 623 631 636 808 873 902 992 993 995 1080 1099 1194 1200 1521 1701 1720 1723 1900 1911 1962 2049 2123 2404 3128 3260 3460 4500 6000 6379 6667 8000 8009 8080 8087 8123, etc.
2020-02-17 16:47:42
176.113.70.60 attackbots
Feb 17 08:57:42 h2177944 kernel: \[5124173.998013\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.70.60 DST=85.214.117.9 LEN=127 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=39277 DPT=1900 LEN=107 
Feb 17 08:57:42 h2177944 kernel: \[5124173.998026\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.70.60 DST=85.214.117.9 LEN=127 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=39277 DPT=1900 LEN=107 
Feb 17 08:57:42 h2177944 kernel: \[5124173.998039\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.70.60 DST=85.214.117.9 LEN=127 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=39278 DPT=1900 LEN=107 
Feb 17 08:57:42 h2177944 kernel: \[5124173.998047\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.70.60 DST=85.214.117.9 LEN=127 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=39278 DPT=1900 LEN=107 
Feb 17 08:57:42 h2177944 kernel: \[5124173.998058\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=176.113.70.60 DST=85.214.117.9 LEN=127 TOS=0x00 PREC=0x00 TTL=242 ID=54321 PROTO=UDP SPT=39279 DPT=1900 LEN=107 
Feb 17 08
2020-02-17 16:26:36
182.61.136.53 attack
SSH login attempts.
2020-02-17 16:33:23
222.186.175.212 attackspambots
Feb 17 00:58:04 debian sshd[32541]: Unable to negotiate with 222.186.175.212 port 15272: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Feb 17 03:23:11 debian sshd[6787]: Unable to negotiate with 222.186.175.212 port 39984: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-02-17 16:31:41
180.241.47.190 attackspam
20/2/16@23:57:30: FAIL: Alarm-Network address from=180.241.47.190
...
2020-02-17 16:37:11

Recently Reported IPs

162.132.6.102 166.55.163.99 109.108.144.19 103.151.133.127
235.93.179.93 207.246.79.36 87.150.99.114 225.228.120.64
115.31.81.63 132.241.157.125 138.84.141.248 180.156.154.211
121.109.60.114 165.36.78.94 193.240.190.34 195.86.195.63
250.73.38.120 201.6.85.234 82.125.41.42 0.59.149.208