Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fredericia

Region: Region Syddanmark

Country: Denmark

Internet Service Provider: TDC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.192.133.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.192.133.64.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 23 18:43:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 64.133.192.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.133.192.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
40.92.75.15 attackbots
threatening lifes
2020-07-28 00:07:16
60.30.98.194 attackspambots
SSH Brute Force
2020-07-27 23:39:47
103.23.100.87 attack
$f2bV_matches
2020-07-27 23:46:38
61.181.128.242 attack
Jul 27 17:49:53 rancher-0 sshd[608715]: Invalid user lxyhs from 61.181.128.242 port 61069
Jul 27 17:49:55 rancher-0 sshd[608715]: Failed password for invalid user lxyhs from 61.181.128.242 port 61069 ssh2
...
2020-07-27 23:51:51
107.174.44.184 attackbots
Invalid user axf from 107.174.44.184 port 41198
2020-07-27 23:55:08
182.61.43.154 attackspam
Jul 27 16:23:43 haigwepa sshd[28564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.43.154 
Jul 27 16:23:45 haigwepa sshd[28564]: Failed password for invalid user training from 182.61.43.154 port 35826 ssh2
...
2020-07-27 23:45:49
2.235.232.134 attackspam
port scan and connect, tcp 80 (http)
2020-07-27 23:53:53
51.195.139.140 attackspam
Jul 27 13:53:29 *** sshd[29165]: Invalid user caiwch from 51.195.139.140
2020-07-27 23:36:48
157.33.149.220 attackbots
Attempts against non-existent wp-login
2020-07-28 00:14:07
148.245.68.149 attack
Automatic report - Port Scan Attack
2020-07-27 23:50:16
176.212.112.191 attackspam
Jul 27 13:52:19 * sshd[27089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.212.112.191
Jul 27 13:52:21 * sshd[27089]: Failed password for invalid user eca from 176.212.112.191 port 54282 ssh2
2020-07-28 00:20:51
192.95.30.228 attack
192.95.30.228 - - [27/Jul/2020:16:32:03 +0100] "POST /wp-login.php HTTP/1.1" 200 4053 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.95.30.228 - - [27/Jul/2020:16:33:38 +0100] "POST /wp-login.php HTTP/1.1" 200 4053 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.95.30.228 - - [27/Jul/2020:16:35:15 +0100] "POST /wp-login.php HTTP/1.1" 200 4053 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-27 23:37:10
122.51.62.212 attack
Jul 27 14:06:52 sd1 sshd[17371]: Invalid user nhostnamein from 122.51.62.212
Jul 27 14:06:52 sd1 sshd[17371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.62.212
Jul 27 14:06:53 sd1 sshd[17371]: Failed password for invalid user nhostnamein from 122.51.62.212 port 60742 ssh2
Jul 27 14:08:41 sd1 sshd[17448]: Invalid user li from 122.51.62.212
Jul 27 14:08:41 sd1 sshd[17448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.62.212

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=122.51.62.212
2020-07-28 00:12:37
49.88.112.75 attack
Jul 27 18:11:34 ip106 sshd[22140]: Failed password for root from 49.88.112.75 port 41527 ssh2
Jul 27 18:11:37 ip106 sshd[22140]: Failed password for root from 49.88.112.75 port 41527 ssh2
...
2020-07-28 00:21:13
179.212.136.198 attack
2020-07-27T15:52:29.165350n23.at sshd[995481]: Invalid user zhangxue from 179.212.136.198 port 3391
2020-07-27T15:52:31.035698n23.at sshd[995481]: Failed password for invalid user zhangxue from 179.212.136.198 port 3391 ssh2
2020-07-27T16:09:32.897728n23.at sshd[1009002]: Invalid user suruiqiang from 179.212.136.198 port 34371
...
2020-07-27 23:35:19

Recently Reported IPs

43.229.133.220 185.50.247.92 127.197.203.120 218.40.131.35
2.110.14.223 148.104.156.190 186.180.42.146 142.204.218.172
104.169.93.44 227.29.61.39 188.50.248.235 88.120.7.35
38.138.0.72 231.216.37.95 151.192.167.149 251.29.146.117
225.55.57.32 116.120.15.129 6.186.32.121 161.246.195.72