Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.99.133.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.99.133.2.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 00:04:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.133.99.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.133.99.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.22.224.50 attack
" "
2019-11-11 16:58:29
51.15.87.74 attack
Nov 11 06:27:41 ms-srv sshd[23209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74  user=backup
Nov 11 06:27:43 ms-srv sshd[23209]: Failed password for invalid user backup from 51.15.87.74 port 46184 ssh2
2019-11-11 16:49:47
118.25.189.123 attackspambots
Invalid user barikian from 118.25.189.123 port 55092
2019-11-11 16:40:00
197.251.69.4 attackbotsspam
Nov 11 09:31:43 sso sshd[865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.251.69.4
Nov 11 09:31:46 sso sshd[865]: Failed password for invalid user hashim from 197.251.69.4 port 55708 ssh2
...
2019-11-11 16:46:15
202.138.229.228 attackbotsspam
Rude login attack (8 tries in 1d)
2019-11-11 16:54:49
181.224.184.67 attackspam
Nov 11 07:36:29 mail sshd[16118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.224.184.67 
Nov 11 07:36:30 mail sshd[16118]: Failed password for invalid user ftp from 181.224.184.67 port 58594 ssh2
Nov 11 07:44:51 mail sshd[20481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.224.184.67
2019-11-11 16:25:10
88.88.112.98 attackspam
detected by Fail2Ban
2019-11-11 16:37:00
200.56.63.155 attackspam
Nov 11 08:32:05 icinga sshd[12513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.63.155
Nov 11 08:32:07 icinga sshd[12513]: Failed password for invalid user sa from 200.56.63.155 port 9046 ssh2
...
2019-11-11 16:18:52
188.131.170.119 attackbotsspam
Nov 11 10:43:55 server sshd\[32255\]: Invalid user shashin from 188.131.170.119
Nov 11 10:43:55 server sshd\[32255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.170.119 
Nov 11 10:43:57 server sshd\[32255\]: Failed password for invalid user shashin from 188.131.170.119 port 34174 ssh2
Nov 11 11:05:59 server sshd\[5803\]: Invalid user sharena from 188.131.170.119
Nov 11 11:05:59 server sshd\[5803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.170.119 
...
2019-11-11 16:26:54
65.39.133.8 attack
65.39.133.8 - - \[11/Nov/2019:09:24:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 10546 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.39.133.8 - - \[11/Nov/2019:09:24:13 +0100\] "POST /wp-login.php HTTP/1.0" 200 10371 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
65.39.133.8 - - \[11/Nov/2019:09:24:16 +0100\] "POST /wp-login.php HTTP/1.0" 200 10366 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-11 16:48:19
207.154.229.50 attackbots
Nov 10 22:40:15 sachi sshd\[13153\]: Invalid user admin from 207.154.229.50
Nov 10 22:40:15 sachi sshd\[13153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
Nov 10 22:40:17 sachi sshd\[13153\]: Failed password for invalid user admin from 207.154.229.50 port 53622 ssh2
Nov 10 22:44:02 sachi sshd\[13473\]: Invalid user larocco from 207.154.229.50
Nov 10 22:44:02 sachi sshd\[13473\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
2019-11-11 16:50:26
24.121.219.54 attackbots
Automatic report - Banned IP Access
2019-11-11 16:44:06
200.13.195.70 attackspambots
Nov 11 09:40:21 server sshd\[15993\]: Invalid user debian from 200.13.195.70
Nov 11 09:40:21 server sshd\[15993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.13.195.70 
Nov 11 09:40:24 server sshd\[15993\]: Failed password for invalid user debian from 200.13.195.70 port 52664 ssh2
Nov 11 09:52:14 server sshd\[18883\]: Invalid user SC from 200.13.195.70
Nov 11 09:52:14 server sshd\[18883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.13.195.70 
...
2019-11-11 16:32:55
134.209.237.55 attackbotsspam
Nov 11 07:21:47 ms-srv sshd[31436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.237.55
Nov 11 07:21:49 ms-srv sshd[31436]: Failed password for invalid user lofti from 134.209.237.55 port 33104 ssh2
2019-11-11 16:41:11
49.35.240.214 attackbots
RDP Bruteforce
2019-11-11 16:43:52

Recently Reported IPs

79.36.247.238 29.208.13.222 118.186.242.207 190.118.84.111
198.49.164.114 156.152.142.212 162.84.174.227 222.96.122.166
237.240.136.160 59.244.237.135 217.45.30.220 18.148.169.1
227.144.126.113 5.118.208.173 212.122.47.58 174.228.7.114
231.222.47.170 95.211.31.207 130.93.36.59 246.5.57.191