Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kazakhstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.133.201.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15675
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.133.201.180.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 04:12:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
180.201.133.2.in-addr.arpa domain name pointer 2.133.201.180.megaline.telecom.kz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
180.201.133.2.in-addr.arpa	name = 2.133.201.180.megaline.telecom.kz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.98.150.9 attack
Aug  9 15:14:24 scw-tender-jepsen sshd[3706]: Failed password for root from 80.98.150.9 port 35486 ssh2
2020-08-10 01:52:09
51.91.45.6 attackspambots
"$f2bV_matches"
2020-08-10 02:14:24
138.197.222.141 attackspambots
Brute-force attempt banned
2020-08-10 02:20:36
103.89.89.60 attackspambots
SIP/5060 Probe, BF, Hack -
2020-08-10 01:48:35
154.179.163.22 attack
Unauthorized connection attempt from IP address 154.179.163.22 on Port 445(SMB)
2020-08-10 01:47:32
139.59.90.31 attackbotsspam
Aug  9 16:29:51 abendstille sshd\[24569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.31  user=root
Aug  9 16:29:53 abendstille sshd\[24569\]: Failed password for root from 139.59.90.31 port 48706 ssh2
Aug  9 16:32:20 abendstille sshd\[27208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.31  user=root
Aug  9 16:32:23 abendstille sshd\[27208\]: Failed password for root from 139.59.90.31 port 52044 ssh2
Aug  9 16:34:53 abendstille sshd\[29775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.31  user=root
...
2020-08-10 01:57:37
89.35.39.180 attackspambots
Attempting to access Wordpress login on a honeypot or private system.
2020-08-10 02:04:33
77.53.145.97 attackbots
Port Scan detected!
...
2020-08-10 02:15:10
49.233.12.222 attack
"$f2bV_matches"
2020-08-10 01:52:24
51.75.83.77 attack
$f2bV_matches
2020-08-10 02:09:13
1.0.253.102 attack
Automatic report - Port Scan Attack
2020-08-10 02:10:15
64.227.99.233 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-08-10 01:49:04
42.98.177.178 attackbots
ET COMPROMISED Known Compromised or Hostile Host Traffic group 24 - port: 22 proto: tcp cat: Misc Attackbytes: 60
2020-08-10 02:13:13
203.195.132.128 attackspam
(sshd) Failed SSH login from 203.195.132.128 (CN/China/-): 5 in the last 3600 secs
2020-08-10 02:18:19
112.192.228.101 attackspam
Lines containing failures of 112.192.228.101
Aug  5 05:24:08 shared05 sshd[15602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.192.228.101  user=r.r
Aug  5 05:24:10 shared05 sshd[15602]: Failed password for r.r from 112.192.228.101 port 55794 ssh2
Aug  5 05:24:11 shared05 sshd[15602]: Received disconnect from 112.192.228.101 port 55794:11: Bye Bye [preauth]
Aug  5 05:24:11 shared05 sshd[15602]: Disconnected from authenticating user r.r 112.192.228.101 port 55794 [preauth]
Aug  5 05:32:25 shared05 sshd[19668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.192.228.101  user=r.r
Aug  5 05:32:27 shared05 sshd[19668]: Failed password for r.r from 112.192.228.101 port 37308 ssh2
Aug  5 05:32:28 shared05 sshd[19668]: Received disconnect from 112.192.228.101 port 37308:11: Bye Bye [preauth]
Aug  5 05:32:28 shared05 sshd[19668]: Disconnected from authenticating user r.r 112.192.228.101 p........
------------------------------
2020-08-10 02:23:05

Recently Reported IPs

179.49.161.58 14.231.140.250 182.124.23.169 23.236.255.99
125.93.83.110 185.177.0.81 18.228.173.48 1.237.15.91
189.253.78.246 182.121.68.97 180.183.173.254 119.203.43.45
116.118.98.23 178.218.194.15 37.34.172.229 81.214.135.138
39.108.166.28 190.146.131.26 189.54.222.118 187.137.171.168