Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Türkiye

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.133.140.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.133.140.215.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:51:33 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 215.140.133.212.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 215.140.133.212.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.145.230.5 attackbotsspam
1577717087 - 12/30/2019 15:44:47 Host: 49.145.230.5/49.145.230.5 Port: 445 TCP Blocked
2019-12-31 03:51:06
45.239.184.66 attackbotsspam
Unauthorized connection attempt detected from IP address 45.239.184.66 to port 445
2019-12-31 03:44:36
46.229.168.146 attack
The IP has triggered Cloudflare WAF. CF-Ray: 54d2c57bed74ea28 | WAF_Rule_ID: 1bd9f7863d3d4d8faf68c16295216fb5 | WAF_Kind: firewall | CF_Action: allow | Country: US | CF_IPClass: searchEngine | Protocol: HTTP/1.1 | Method: GET | Host: www.wevg.org | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-31 04:18:04
110.80.152.232 attack
Unauthorized connection attempt detected from IP address 110.80.152.232 to port 1433
2019-12-31 03:38:17
47.110.242.203 attackspam
Unauthorized connection attempt detected from IP address 47.110.242.203 to port 1433
2019-12-31 03:43:51
196.201.228.118 attackspambots
DATE:2019-12-30 15:44:26, IP:196.201.228.118, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-31 04:06:51
42.117.20.16 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-31 04:00:15
81.4.150.134 attack
Dec 30 21:10:35 plex sshd[20449]: Failed password for invalid user 1023xzc from 81.4.150.134 port 47018 ssh2
Dec 30 21:10:33 plex sshd[20449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.150.134
Dec 30 21:10:33 plex sshd[20449]: Invalid user 1023xzc from 81.4.150.134 port 47018
Dec 30 21:10:35 plex sshd[20449]: Failed password for invalid user 1023xzc from 81.4.150.134 port 47018 ssh2
Dec 30 21:14:45 plex sshd[20469]: Invalid user gultekin from 81.4.150.134 port 60458
2019-12-31 04:20:28
104.131.15.189 attackbotsspam
2019-12-06T18:47:44.870797suse-nuc sshd[13619]: Invalid user atom from 104.131.15.189 port 33669
...
2019-12-31 04:09:37
106.56.247.251 attackbots
Unauthorized connection attempt detected from IP address 106.56.247.251 to port 445
2019-12-31 03:39:06
111.242.81.14 attackbots
19/12/30@09:44:34: FAIL: Alarm-Network address from=111.242.81.14
19/12/30@09:44:34: FAIL: Alarm-Network address from=111.242.81.14
...
2019-12-31 04:01:43
83.69.176.168 attack
Unauthorized connection attempt detected from IP address 83.69.176.168 to port 5555
2019-12-31 03:40:13
195.154.28.229 attack
\[2019-12-30 14:56:24\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '195.154.28.229:57214' - Wrong password
\[2019-12-30 14:56:24\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T14:56:24.473-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1092",SessionID="0x7f0fb4989b48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.28.229/57214",Challenge="588a530b",ReceivedChallenge="588a530b",ReceivedHash="5e0e06d5d5a72f16dd6ed0d5653b162e"
\[2019-12-30 14:57:04\] NOTICE\[2839\] chan_sip.c: Registration from '\' failed for '195.154.28.229:64332' - Wrong password
\[2019-12-30 14:57:04\] SECURITY\[2857\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-30T14:57:04.647-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="1093",SessionID="0x7f0fb48c2048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.15
2019-12-31 04:18:46
42.117.20.160 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-31 03:57:12
110.243.13.171 attackbots
Fail2Ban Ban Triggered
2019-12-31 04:02:24

Recently Reported IPs

32.234.254.103 45.6.83.214 74.81.143.92 74.50.123.235
17.130.89.120 60.70.212.112 81.85.239.161 249.219.90.134
207.219.153.92 159.85.16.57 107.191.177.33 80.36.121.28
82.52.49.49 254.239.19.116 169.160.153.91 73.59.216.32
22.131.66.205 167.209.174.154 246.1.223.191 122.102.120.39