Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.105.21.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.105.21.133.			IN	A

;; AUTHORITY SECTION:
.			565	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022053100 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 31 16:48:53 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 133.21.105.199.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 199.105.21.133.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
154.72.199.146 attackspam
Unauthorized connection attempt from IP address 154.72.199.146 on Port 445(SMB)
2020-04-11 19:56:00
51.77.226.68 attackbotsspam
Invalid user smbguest from 51.77.226.68 port 52980
2020-04-11 20:08:55
27.2.65.228 attack
Unauthorized connection attempt from IP address 27.2.65.228 on Port 445(SMB)
2020-04-11 19:42:41
114.99.247.139 attackspam
Unauthorized connection attempt detected from IP address 114.99.247.139 to port 23 [T]
2020-04-11 20:10:43
120.92.33.13 attack
Apr 11 13:44:24 srv206 sshd[6640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.33.13  user=root
Apr 11 13:44:25 srv206 sshd[6640]: Failed password for root from 120.92.33.13 port 63172 ssh2
...
2020-04-11 19:56:25
45.143.223.61 attackbots
Brute force attempt
2020-04-11 20:01:24
80.82.70.118 attack
SSH login attempts
2020-04-11 19:38:23
223.204.235.55 attackspambots
Unauthorized connection attempt from IP address 223.204.235.55 on Port 445(SMB)
2020-04-11 20:14:34
117.6.94.35 attackspambots
Unauthorized connection attempt from IP address 117.6.94.35 on Port 445(SMB)
2020-04-11 19:55:29
141.98.81.83 attackbotsspam
Invalid user guest from 141.98.81.83 port 40187
2020-04-11 20:06:37
36.85.191.111 attackspambots
Unauthorized connection attempt from IP address 36.85.191.111 on Port 445(SMB)
2020-04-11 19:36:28
54.38.185.226 attackspambots
Apr 11 13:13:24  sshd\[12283\]: User root from build-it.online not allowed because not listed in AllowUsersApr 11 13:13:26  sshd\[12283\]: Failed password for invalid user root from 54.38.185.226 port 34284 ssh2
...
2020-04-11 19:36:07
136.34.166.239 attackbotsspam
port 23
2020-04-11 20:03:17
51.83.73.115 attackbots
2020-04-11T05:39:09.933857rocketchat.forhosting.nl sshd[7750]: Invalid user pink from 51.83.73.115 port 51190
2020-04-11T05:39:12.109133rocketchat.forhosting.nl sshd[7750]: Failed password for invalid user pink from 51.83.73.115 port 51190 ssh2
2020-04-11T05:45:53.326575rocketchat.forhosting.nl sshd[7898]: Invalid user server from 51.83.73.115 port 42501
...
2020-04-11 19:46:20
141.98.81.108 attack
$f2bV_matches
2020-04-11 19:41:19

Recently Reported IPs

123.194.181.167 251.108.30.146 243.149.49.155 141.145.150.53
104.114.90.188 87.247.172.187 252.120.47.166 242.136.226.114
164.139.100.43 34.182.165.21 239.180.242.60 71.238.251.129
38.146.116.20 253.183.181.29 81.110.131.231 31.47.76.54
118.27.100.252 118.27.100.182 4.197.30.217 64.247.160.42