Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.133.127.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33826
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.133.127.134.		IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:37:42 CST 2022
;; MSG SIZE  rcvd: 108
Host info
134.127.133.213.in-addr.arpa domain name pointer static.213-133-127-134.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.127.133.213.in-addr.arpa	name = static.213-133-127-134.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.77.244.133 attackbotsspam
Automatic report - Banned IP Access
2020-07-29 20:00:30
106.54.145.68 attackspam
SSH Brute Force
2020-07-29 19:50:56
187.109.21.245 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-29 20:15:08
172.93.188.229 attackbots
E-Mail Spam (RBL) [REJECTED]
2020-07-29 19:42:23
39.51.102.53 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-29 19:41:26
222.186.190.2 attack
Jul 29 13:32:35 sso sshd[7751]: Failed password for root from 222.186.190.2 port 63806 ssh2
Jul 29 13:32:38 sso sshd[7751]: Failed password for root from 222.186.190.2 port 63806 ssh2
...
2020-07-29 19:39:30
190.186.177.139 attack
Hits on port : 1433
2020-07-29 19:37:33
81.199.122.236 attackspambots
Jul 29 13:30:09 relay postfix/smtpd\[1458\]: warning: unknown\[81.199.122.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 13:30:15 relay postfix/smtpd\[1458\]: warning: unknown\[81.199.122.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 13:30:25 relay postfix/smtpd\[1458\]: warning: unknown\[81.199.122.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 13:43:53 relay postfix/smtpd\[27773\]: warning: unknown\[81.199.122.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 29 13:43:59 relay postfix/smtpd\[27773\]: warning: unknown\[81.199.122.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-29 19:49:59
45.14.150.86 attackspambots
(sshd) Failed SSH login from 45.14.150.86 (RO/Romania/-): 5 in the last 3600 secs
2020-07-29 20:14:48
49.232.161.5 attackspambots
$f2bV_matches
2020-07-29 20:10:01
159.65.189.115 attack
SSH Brute Force
2020-07-29 19:44:53
167.56.55.161 attack
Automatic report - Port Scan Attack
2020-07-29 19:49:05
52.17.98.131 attackbots
24 attempts against mh-misbehave-ban on apple
2020-07-29 20:12:46
123.206.226.149 attack
Invalid user elasticsearch from 123.206.226.149 port 52796
2020-07-29 20:08:38
23.101.173.33 attackspam
 TCP (SYN) 23.101.173.33:53151 -> port 23, len 44
2020-07-29 19:35:39

Recently Reported IPs

213.133.110.213 213.133.123.171 213.133.97.79 213.133.121.68
213.133.98.150 213.133.99.148 213.133.127.247 213.133.97.212
213.133.97.240 213.133.127.245 213.134.177.146 213.133.99.219
213.134.179.97 213.134.180.251 213.134.168.87 213.134.59.44
213.134.36.198 213.135.128.14 213.135.137.120 213.135.157.211