Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pune

Region: Maharashtra

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: Reliance Jio Infocomm Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.33.120.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41241
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.33.120.20.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 23:40:31 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 20.120.33.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 20.120.33.157.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
59.148.173.231 attackspam
2019-10-29T21:07:04.726477abusebot-2.cloudsearch.cf sshd\[4949\]: Invalid user HY\^JU\&KI\*LO\( from 59.148.173.231 port 54018
2019-10-30 05:38:41
24.2.205.235 attackbots
2019-10-29T21:27:17.526017abusebot-5.cloudsearch.cf sshd\[7018\]: Invalid user oracle from 24.2.205.235 port 35199
2019-10-30 05:52:07
192.144.132.172 attackbotsspam
Automatic report - Banned IP Access
2019-10-30 05:58:08
139.219.137.246 attack
Oct 29 17:18:28 plusreed sshd[22678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.137.246  user=root
Oct 29 17:18:30 plusreed sshd[22678]: Failed password for root from 139.219.137.246 port 36374 ssh2
...
2019-10-30 06:14:09
167.99.203.202 attackbots
2019-10-29T22:17:01.902389tmaserv sshd\[26959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.203.202
2019-10-29T22:17:03.283628tmaserv sshd\[26959\]: Failed password for invalid user course from 167.99.203.202 port 57826 ssh2
2019-10-29T23:19:57.737151tmaserv sshd\[29618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.203.202  user=root
2019-10-29T23:19:59.162638tmaserv sshd\[29618\]: Failed password for root from 167.99.203.202 port 48828 ssh2
2019-10-29T23:23:21.974825tmaserv sshd\[29978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.203.202  user=root
2019-10-29T23:23:23.406643tmaserv sshd\[29978\]: Failed password for root from 167.99.203.202 port 57736 ssh2
...
2019-10-30 06:01:08
187.216.127.147 attackbots
Oct 29 22:03:12 minden010 sshd[17935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.216.127.147
Oct 29 22:03:14 minden010 sshd[17935]: Failed password for invalid user abc@1234 from 187.216.127.147 port 34408 ssh2
Oct 29 22:11:25 minden010 sshd[28847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.216.127.147
...
2019-10-30 05:59:44
41.39.1.31 attack
Unauthorized connection attempt from IP address 41.39.1.31 on Port 445(SMB)
2019-10-30 06:12:02
222.186.173.215 attackspambots
2019-10-28 05:43:40 -> 2019-10-29 07:57:25 : 16 login attempts (222.186.173.215)
2019-10-30 06:09:27
106.52.202.59 attackspam
invalid user
2019-10-30 05:47:31
51.68.125.206 attackspambots
Oct 29 22:32:45 ns381471 sshd[2766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.125.206
Oct 29 22:32:47 ns381471 sshd[2766]: Failed password for invalid user ovh from 51.68.125.206 port 52498 ssh2
2019-10-30 05:43:11
200.148.186.194 attack
Unauthorized connection attempt from IP address 200.148.186.194 on Port 445(SMB)
2019-10-30 06:04:52
45.136.109.95 attack
10/29/2019-17:24:03.231862 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-30 06:03:34
222.186.160.241 attackbotsspam
Unauthorized connection attempt from IP address 222.186.160.241 on Port 3306(MYSQL)
2019-10-30 06:13:12
106.51.48.67 attackspambots
Unauthorized connection attempt from IP address 106.51.48.67 on Port 445(SMB)
2019-10-30 05:51:36
59.48.203.22 attackbots
Unauthorized connection attempt from IP address 59.48.203.22 on Port 445(SMB)
2019-10-30 06:07:32

Recently Reported IPs

104.168.65.2 191.31.137.100 211.148.241.166 178.33.20.158
50.135.77.254 45.116.35.176 213.217.18.6 141.98.80.46
39.63.45.69 47.190.179.117 83.52.177.99 81.185.163.158
198.255.58.123 132.95.211.155 76.11.144.245 44.234.219.65
69.39.53.78 134.3.147.138 51.144.75.36 172.210.28.104