Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.133.46.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.133.46.134.			IN	A

;; AUTHORITY SECTION:
.			289	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100401 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 05 03:10:58 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 134.46.133.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.46.133.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
145.239.82.11 attackbots
May 11 14:31:31 ns382633 sshd\[9739\]: Invalid user oprofile from 145.239.82.11 port 42592
May 11 14:31:31 ns382633 sshd\[9739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.11
May 11 14:31:33 ns382633 sshd\[9739\]: Failed password for invalid user oprofile from 145.239.82.11 port 42592 ssh2
May 11 15:03:46 ns382633 sshd\[16380\]: Invalid user jboss from 145.239.82.11 port 51824
May 11 15:03:46 ns382633 sshd\[16380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.11
2020-05-12 04:25:11
168.90.35.2 attackspam
Unauthorized connection attempt from IP address 168.90.35.2 on Port 445(SMB)
2020-05-12 04:12:05
212.129.17.32 attack
ET SCAN Sipvicious Scan - port: 5060 proto: UDP cat: Attempted Information Leak
2020-05-12 04:02:57
89.248.172.85 attack
firewall-block, port(s): 3739/tcp, 50091/tcp
2020-05-12 04:28:31
87.251.74.170 attack
 TCP (SYN) 87.251.74.170:59971 -> port 11550, len 44
2020-05-12 04:31:24
193.228.109.189 attackspam
20 attempts against mh-ssh on water
2020-05-12 04:30:22
111.229.99.69 attack
SSH Brute Force
2020-05-12 04:29:15
192.210.192.165 attackbots
5x Failed Password
2020-05-12 04:20:12
180.249.119.202 attackspambots
Automatic report - Port Scan Attack
2020-05-12 04:29:47
173.249.47.214 attackspam
Unauthorized connection attempt from IP address 173.249.47.214 on Port 445(SMB)
2020-05-12 04:35:43
210.1.88.22 attack
20/5/11@08:01:05: FAIL: Alarm-Network address from=210.1.88.22
...
2020-05-12 04:31:48
114.47.96.154 attack
Port probing on unauthorized port 23
2020-05-12 04:33:04
185.112.33.149 attackbotsspam
xmlrpc attack
2020-05-12 04:03:37
80.81.0.94 attack
May 11 21:42:16 santamaria sshd\[9338\]: Invalid user esbuser from 80.81.0.94
May 11 21:42:16 santamaria sshd\[9338\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.81.0.94
May 11 21:42:17 santamaria sshd\[9338\]: Failed password for invalid user esbuser from 80.81.0.94 port 62168 ssh2
...
2020-05-12 04:00:24
107.170.195.87 attack
*Port Scan* detected from 107.170.195.87 (US/United States/California/San Francisco/charles-creative.managed). 4 hits in the last 235 seconds
2020-05-12 04:35:18

Recently Reported IPs

73.22.136.138 126.49.127.63 36.21.7.206 95.243.66.104
112.27.92.19 79.124.214.108 76.241.187.42 99.31.84.13
82.24.168.159 188.253.234.194 218.140.156.78 220.118.69.75
77.244.124.221 221.104.54.119 76.113.211.113 37.114.183.56
190.1.131.212 5.197.134.62 210.179.53.240 178.120.216.112