Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.173.213.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30207
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.173.213.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 20:43:56 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 133.213.173.204.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.213.173.204.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.221.241.97 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:46:08
49.234.96.24 attackbots
Brute force SMTP login attempted.
...
2020-03-18 08:08:29
118.25.94.105 attack
$f2bV_matches
2020-03-18 08:26:34
61.164.96.82 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:30:45
36.236.138.132 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:44:42
45.162.158.246 attack
Port probing on unauthorized port 23
2020-03-18 08:37:21
94.177.240.4 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-03-18 08:32:19
157.245.113.44 attack
SSH Invalid Login
2020-03-18 08:17:50
139.208.40.28 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:22:44
51.83.104.120 attack
Mar 17 19:52:45 Tower sshd[32627]: Connection from 51.83.104.120 port 48736 on 192.168.10.220 port 22 rdomain ""
Mar 17 19:52:46 Tower sshd[32627]: Failed password for root from 51.83.104.120 port 48736 ssh2
Mar 17 19:52:46 Tower sshd[32627]: Received disconnect from 51.83.104.120 port 48736:11: Bye Bye [preauth]
Mar 17 19:52:46 Tower sshd[32627]: Disconnected from authenticating user root 51.83.104.120 port 48736 [preauth]
2020-03-18 08:13:41
182.16.163.2 attackbotsspam
20/3/17@14:16:59: FAIL: Alarm-Network address from=182.16.163.2
...
2020-03-18 08:14:32
103.243.252.244 attackbotsspam
Mar 17 21:06:18 *** sshd[13459]: Invalid user lixiangfeng from 103.243.252.244
2020-03-18 08:24:35
58.141.232.44 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 08:27:03
1.179.137.10 attackbotsspam
Mar 17 23:38:29 IngegnereFirenze sshd[19812]: Failed password for invalid user cnc from 1.179.137.10 port 40391 ssh2
...
2020-03-18 08:10:38
80.82.78.100 attackbotsspam
80.82.78.100 was recorded 18 times by 10 hosts attempting to connect to the following ports: 1030,1027,1045. Incident counter (4h, 24h, all-time): 18, 68, 21852
2020-03-18 08:10:23

Recently Reported IPs

188.71.82.49 176.97.248.247 17.124.65.81 226.194.24.243
184.28.115.229 245.202.68.210 164.26.132.137 118.0.11.73
181.69.65.46 210.153.177.187 107.225.74.217 87.24.89.1
194.176.221.10 207.246.166.14 215.143.143.217 220.117.4.121
63.114.63.28 197.235.205.246 195.89.204.212 13.44.247.162