Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nijmegen

Region: Gelderland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.124.170.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.124.170.133.		IN	A

;; AUTHORITY SECTION:
.			459	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021073100 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 31 17:42:00 CST 2021
;; MSG SIZE  rcvd: 108
Host info
133.170.124.213.in-addr.arpa domain name pointer ip-213-124-170-133.ip.prioritytelecom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.170.124.213.in-addr.arpa	name = ip-213-124-170-133.ip.prioritytelecom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.10.48 attack
Jun  9 13:03:51 ajax sshd[12689]: Failed password for root from 49.234.10.48 port 33516 ssh2
Jun  9 13:08:40 ajax sshd[13394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.10.48
2020-06-09 20:45:33
181.143.83.242 attack
1591704543 - 06/09/2020 14:09:03 Host: 181.143.83.242/181.143.83.242 Port: 445 TCP Blocked
2020-06-09 20:21:07
45.65.208.74 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-09 20:12:32
209.65.71.3 attack
leo_www
2020-06-09 20:55:26
116.110.10.167 attack
Jun  9 00:46:49 ks10 sshd[1660407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.110.10.167 
Jun  9 00:46:52 ks10 sshd[1660407]: Failed password for invalid user admin from 116.110.10.167 port 20934 ssh2
...
2020-06-09 20:40:51
145.239.136.104 attackbots
Jun  9 06:04:30 olgosrv01 sshd[13236]: Failed password for r.r from 145.239.136.104 port 35134 ssh2
Jun  9 06:04:30 olgosrv01 sshd[13236]: Received disconnect from 145.239.136.104: 11: Bye Bye [preauth]
Jun  9 06:13:07 olgosrv01 sshd[14053]: Invalid user admin from 145.239.136.104
Jun  9 06:13:09 olgosrv01 sshd[14053]: Failed password for invalid user admin from 145.239.136.104 port 39664 ssh2
Jun  9 06:13:09 olgosrv01 sshd[14053]: Received disconnect from 145.239.136.104: 11: Bye Bye [preauth]
Jun  9 06:16:23 olgosrv01 sshd[14291]: Invalid user urbanoo from 145.239.136.104
Jun  9 06:16:25 olgosrv01 sshd[14291]: Failed password for invalid user urbanoo from 145.239.136.104 port 58000 ssh2
Jun  9 06:16:25 olgosrv01 sshd[14291]: Received disconnect from 145.239.136.104: 11: Bye Bye [preauth]
Jun  9 06:19:44 olgosrv01 sshd[14548]: Failed password for r.r from 145.239.136.104 port 48804 ssh2
Jun  9 06:19:44 olgosrv01 sshd[14548]: Received disconnect from 145.239.136.104: 11........
-------------------------------
2020-06-09 20:40:07
79.137.163.43 attackbotsspam
Lines containing failures of 79.137.163.43
Jun  8 22:23:27 newdogma sshd[2952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.163.43  user=r.r
Jun  8 22:23:29 newdogma sshd[2952]: Failed password for r.r from 79.137.163.43 port 56174 ssh2
Jun  8 22:23:31 newdogma sshd[2952]: Received disconnect from 79.137.163.43 port 56174:11: Bye Bye [preauth]
Jun  8 22:23:31 newdogma sshd[2952]: Disconnected from authenticating user r.r 79.137.163.43 port 56174 [preauth]
Jun  8 22:37:12 newdogma sshd[3206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.163.43  user=r.r
Jun  8 22:37:14 newdogma sshd[3206]: Failed password for r.r from 79.137.163.43 port 48336 ssh2
Jun  8 22:37:16 newdogma sshd[3206]: Received disconnect from 79.137.163.43 port 48336:11: Bye Bye [preauth]
Jun  8 22:37:16 newdogma sshd[3206]: Disconnected from authenticating user r.r 79.137.163.43 port 48336 [preauth]
Jun  8........
------------------------------
2020-06-09 20:17:56
143.92.42.120 attack
Jun  9 14:04:26 localhost sshd\[5377\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.92.42.120  user=root
Jun  9 14:04:29 localhost sshd\[5377\]: Failed password for root from 143.92.42.120 port 44724 ssh2
Jun  9 14:08:56 localhost sshd\[5762\]: Invalid user monitor from 143.92.42.120
Jun  9 14:08:56 localhost sshd\[5762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.92.42.120
Jun  9 14:08:58 localhost sshd\[5762\]: Failed password for invalid user monitor from 143.92.42.120 port 49094 ssh2
...
2020-06-09 20:24:19
179.212.136.198 attackspam
Jun  9 01:02:51 cumulus sshd[4832]: Invalid user server-name from 179.212.136.198 port 44028
Jun  9 01:02:51 cumulus sshd[4832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.212.136.198
Jun  9 01:02:52 cumulus sshd[4832]: Failed password for invalid user server-name from 179.212.136.198 port 44028 ssh2
Jun  9 01:02:52 cumulus sshd[4832]: Received disconnect from 179.212.136.198 port 44028:11: Bye Bye [preauth]
Jun  9 01:02:52 cumulus sshd[4832]: Disconnected from 179.212.136.198 port 44028 [preauth]
Jun  9 01:09:35 cumulus sshd[5475]: Invalid user thostnameanic from 179.212.136.198 port 20835
Jun  9 01:09:35 cumulus sshd[5475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.212.136.198
Jun  9 01:09:37 cumulus sshd[5475]: Failed password for invalid user thostnameanic from 179.212.136.198 port 20835 ssh2
Jun  9 01:09:37 cumulus sshd[5475]: Received disconnect from 179.212.136.198 ........
-------------------------------
2020-06-09 20:50:17
113.199.41.211 attack
Jun  9 14:04:36 eventyay sshd[20822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.41.211
Jun  9 14:04:38 eventyay sshd[20822]: Failed password for invalid user auditor from 113.199.41.211 port 24587 ssh2
Jun  9 14:08:48 eventyay sshd[20966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.41.211
...
2020-06-09 20:37:05
79.129.218.200 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-09 20:14:22
185.39.10.45 attackspambots
Jun  9 15:08:52 debian kernel: [607088.353716] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.39.10.45 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=31591 PROTO=TCP SPT=41444 DPT=15100 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-09 20:30:01
174.138.59.36 attack
Jun  9 14:08:50 vmi345603 sshd[28403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.59.36
Jun  9 14:08:52 vmi345603 sshd[28403]: Failed password for invalid user fofserver from 174.138.59.36 port 57084 ssh2
...
2020-06-09 20:30:43
27.78.14.83 attackspam
Jun  9 14:47:43 serwer sshd\[32323\]: Invalid user system from 27.78.14.83 port 39396
Jun  9 14:47:43 serwer sshd\[32323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83
Jun  9 14:47:46 serwer sshd\[32323\]: Failed password for invalid user system from 27.78.14.83 port 39396 ssh2
...
2020-06-09 20:49:05
222.186.30.76 attack
Jun  9 14:54:36 abendstille sshd\[26977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun  9 14:54:38 abendstille sshd\[26977\]: Failed password for root from 222.186.30.76 port 15065 ssh2
Jun  9 14:54:40 abendstille sshd\[26977\]: Failed password for root from 222.186.30.76 port 15065 ssh2
Jun  9 14:54:43 abendstille sshd\[26977\]: Failed password for root from 222.186.30.76 port 15065 ssh2
Jun  9 14:54:45 abendstille sshd\[27090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
...
2020-06-09 20:55:53

Recently Reported IPs

172.70.122.54 109.166.164.114 117.195.61.109 136.144.41.217
128.199.182.220 5.188.86.126 143.208.41.12 81.150.73.70
81.150.73.184 192.241.215.95 192.241.217.162 188.234.73.41
18.153.6.91 95.29.43.128 37.139.52.214 108.128.136.10
18.153.6.76 190.123.219.245 2.21.173.34 212.30.134.166