Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nur-Sultan

Region: Nur-Sultan

Country: Kazakhstan

Internet Service Provider: Kazakhtelecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.133.29.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35381
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.133.29.27.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 19 06:16:17 CST 2022
;; MSG SIZE  rcvd: 104
Host info
27.29.133.2.in-addr.arpa domain name pointer 2.133.29.27.megaline.telecom.kz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.29.133.2.in-addr.arpa	name = 2.133.29.27.megaline.telecom.kz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.148.31.114 attackspam
Unauthorized connection attempt: SRC=201.148.31.114
...
2020-06-25 04:29:36
93.179.118.218 attack
Jun 24 18:22:48 host sshd[9937]: Invalid user test from 93.179.118.218 port 52948
...
2020-06-25 04:20:27
51.38.129.34 attack
"URL file extension is restricted by policy - .bak"
2020-06-25 03:59:04
91.222.250.220 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-25 04:41:12
111.72.193.30 attackbots
Jun 24 22:36:50 srv01 postfix/smtpd\[16353\]: warning: unknown\[111.72.193.30\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 22:37:01 srv01 postfix/smtpd\[16353\]: warning: unknown\[111.72.193.30\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 22:37:17 srv01 postfix/smtpd\[16353\]: warning: unknown\[111.72.193.30\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 22:37:36 srv01 postfix/smtpd\[16353\]: warning: unknown\[111.72.193.30\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 22:37:47 srv01 postfix/smtpd\[16353\]: warning: unknown\[111.72.193.30\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-25 04:41:54
46.38.145.4 attack
2020-06-24 22:48:07 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=af@lavrinenko.info)
2020-06-24 22:48:52 auth_plain authenticator failed for (User) [46.38.145.4]: 535 Incorrect authentication data (set_id=prelaunch@lavrinenko.info)
...
2020-06-25 04:14:59
66.70.130.151 attackspam
$f2bV_matches
2020-06-25 04:20:56
176.31.250.160 attackspambots
Jun 24 05:01:35 mockhub sshd[23402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.160
Jun 24 05:01:37 mockhub sshd[23402]: Failed password for invalid user devman from 176.31.250.160 port 56172 ssh2
...
2020-06-25 04:13:29
45.143.220.110 attackbotsspam
 UDP 45.143.220.110:5110 -> port 35070, len 428
2020-06-25 04:26:28
112.134.93.197 attackspam
Attempts against non-existent wp-login
2020-06-25 04:03:59
185.220.101.40 attackbotsspam
"Restricted File Access Attempt - Matched Data: wp-config.php found within REQUEST_FILENAME: /wp-config.php.1"
2020-06-25 04:21:33
210.86.239.186 attackbots
2020-06-24T18:02:31.882384abusebot-8.cloudsearch.cf sshd[2897]: Invalid user postgres from 210.86.239.186 port 52870
2020-06-24T18:02:31.888547abusebot-8.cloudsearch.cf sshd[2897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.86.239.186
2020-06-24T18:02:31.882384abusebot-8.cloudsearch.cf sshd[2897]: Invalid user postgres from 210.86.239.186 port 52870
2020-06-24T18:02:34.497612abusebot-8.cloudsearch.cf sshd[2897]: Failed password for invalid user postgres from 210.86.239.186 port 52870 ssh2
2020-06-24T18:03:53.574749abusebot-8.cloudsearch.cf sshd[2899]: Invalid user tf2server from 210.86.239.186 port 36556
2020-06-24T18:03:53.581795abusebot-8.cloudsearch.cf sshd[2899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.86.239.186
2020-06-24T18:03:53.574749abusebot-8.cloudsearch.cf sshd[2899]: Invalid user tf2server from 210.86.239.186 port 36556
2020-06-24T18:03:55.781568abusebot-8.cloudsearch.cf ss
...
2020-06-25 04:17:08
177.66.211.7 attackspam
1593000072 - 06/24/2020 14:01:12 Host: 177.66.211.7/177.66.211.7 Port: 445 TCP Blocked
2020-06-25 04:37:10
35.194.129.208 attackbotsspam
Jun 24 14:01:16 debian-2gb-nbg1-2 kernel: \[15258743.061136\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=35.194.129.208 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=228 ID=26945 PROTO=TCP SPT=57708 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-25 04:33:18
212.36.201.197 attack
Unauthorized connection attempt: SRC=212.36.201.197
...
2020-06-25 04:28:44

Recently Reported IPs

229.69.199.208 131.11.163.157 185.144.60.128 186.225.192.228
36.244.188.83 121.189.58.170 14.164.136.172 111.63.159.231
118.207.176.128 6.220.59.84 34.242.237.106 148.222.127.143
140.134.96.2 88.143.158.92 133.170.255.244 195.156.100.101
197.127.162.213 96.210.181.127 212.29.87.97 5.120.211.175