Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.42.212.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.42.212.133.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061000 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 01:13:58 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 133.212.42.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.212.42.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.27.63.14 attack
Honeypot attack, port: 81, PTR: 201-27-63-14.dsl.telesp.net.br.
2020-02-08 18:14:35
106.13.86.136 attack
Automatic report - SSH Brute-Force Attack
2020-02-08 17:30:46
84.143.80.202 attackbots
Feb  8 08:07:32 mail postfix/smtpd[4900]: warning: p548F50CA.dip0.t-ipconnect.de[84.143.80.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  8 08:10:18 mail postfix/smtpd[8724]: warning: p548F50CA.dip0.t-ipconnect.de[84.143.80.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  8 08:10:52 mail postfix/smtpd[8725]: warning: p548F50CA.dip0.t-ipconnect.de[84.143.80.202]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-02-08 18:01:29
182.73.214.226 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-08 17:45:14
85.105.133.168 attack
Automatic report - Port Scan Attack
2020-02-08 18:11:42
129.28.88.77 attackspam
sshd jail - ssh hack attempt
2020-02-08 17:43:56
212.64.44.165 attackspam
Feb  8 00:24:53 mockhub sshd[575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.44.165
Feb  8 00:24:55 mockhub sshd[575]: Failed password for invalid user jut from 212.64.44.165 port 51514 ssh2
...
2020-02-08 17:37:05
121.187.10.162 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-08 17:45:37
49.235.169.15 attackspambots
Feb  8 06:13:34 firewall sshd[10517]: Invalid user new from 49.235.169.15
Feb  8 06:13:36 firewall sshd[10517]: Failed password for invalid user new from 49.235.169.15 port 60092 ssh2
Feb  8 06:18:31 firewall sshd[10713]: Invalid user ldm from 49.235.169.15
...
2020-02-08 17:50:56
187.189.241.135 attackbots
2020-02-08T02:42:44.478337-07:00 suse-nuc sshd[27392]: Invalid user jbx from 187.189.241.135 port 59420
...
2020-02-08 18:06:28
106.12.16.140 attackbotsspam
Feb  8 10:42:37 legacy sshd[29383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
Feb  8 10:42:40 legacy sshd[29383]: Failed password for invalid user ndu from 106.12.16.140 port 34198 ssh2
Feb  8 10:48:46 legacy sshd[29801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.140
...
2020-02-08 17:53:02
73.167.84.250 attack
Feb  8 08:26:33 lnxded64 sshd[10361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.167.84.250
2020-02-08 17:33:36
83.97.20.33 attack
Scanning for open ports and vulnerable services: 25,110,143,456,995,1080,3128,4567,8081,8089
2020-02-08 17:34:22
221.2.35.78 attack
Feb  8 04:53:24 sshgateway sshd\[13023\]: Invalid user udo from 221.2.35.78
Feb  8 04:53:24 sshgateway sshd\[13023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.35.78
Feb  8 04:53:27 sshgateway sshd\[13023\]: Failed password for invalid user udo from 221.2.35.78 port 7555 ssh2
2020-02-08 17:43:33
179.33.137.117 attackbotsspam
Feb  8 09:58:53 MK-Soft-Root2 sshd[13340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.137.117 
Feb  8 09:58:55 MK-Soft-Root2 sshd[13340]: Failed password for invalid user hcf from 179.33.137.117 port 37168 ssh2
...
2020-02-08 17:46:50

Recently Reported IPs

151.41.222.94 3.217.172.226 9.145.11.100 157.163.98.159
233.7.91.212 214.125.177.151 222.88.107.61 38.68.251.22
71.68.138.198 213.21.129.110 5.6.240.160 21.94.44.120
49.142.29.12 78.35.130.92 68.35.100.169 205.70.204.89
222.51.155.63 53.0.71.181 28.203.42.40 235.13.174.93