Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ankara

Region: Ankara

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: Tellcom Iletisim Hizmetleri A.s.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.14.133.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47204
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.14.133.117.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 16 01:22:55 +08 2019
;; MSG SIZE  rcvd: 118

Host info
117.133.14.213.in-addr.arpa domain name pointer host-213-14-133-117.reverse.superonline.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
117.133.14.213.in-addr.arpa	name = host-213-14-133-117.reverse.superonline.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
79.137.77.131 attackspambots
$f2bV_matches
2020-08-19 05:27:45
125.238.235.135 attackspambots
Port 22 Scan, PTR: None
2020-08-19 05:31:07
185.181.55.169 attackspambots
Attempted connection to port 8080.
2020-08-19 05:39:53
190.85.50.62 attackbots
Unauthorized connection attempt from IP address 190.85.50.62 on Port 445(SMB)
2020-08-19 05:51:37
102.165.30.61 attackspam
Input Traffic from this IP, but critial abuseconfidencescore
2020-08-19 05:53:30
54.36.190.245 attackbotsspam
Aug 17 12:12:01 ingram sshd[4742]: Invalid user dom from 54.36.190.245
Aug 17 12:12:01 ingram sshd[4742]: Failed password for invalid user dom from 54.36.190.245 port 60874 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.36.190.245
2020-08-19 05:28:14
66.45.251.154 attackspam
2020-08-18T20:46:19.604355abusebot-2.cloudsearch.cf sshd[29824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.45.251.154  user=root
2020-08-18T20:46:21.597230abusebot-2.cloudsearch.cf sshd[29824]: Failed password for root from 66.45.251.154 port 51400 ssh2
2020-08-18T20:46:22.637305abusebot-2.cloudsearch.cf sshd[29826]: Invalid user admin from 66.45.251.154 port 54456
2020-08-18T20:46:22.644120abusebot-2.cloudsearch.cf sshd[29826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.45.251.154
2020-08-18T20:46:22.637305abusebot-2.cloudsearch.cf sshd[29826]: Invalid user admin from 66.45.251.154 port 54456
2020-08-18T20:46:24.716581abusebot-2.cloudsearch.cf sshd[29826]: Failed password for invalid user admin from 66.45.251.154 port 54456 ssh2
2020-08-18T20:46:25.695218abusebot-2.cloudsearch.cf sshd[29828]: Invalid user admin from 66.45.251.154 port 57360
...
2020-08-19 05:35:22
182.61.18.101 attackbots
Attempted connection to port 6379.
2020-08-19 05:41:44
190.80.194.37 attack
Attempted connection to port 445.
2020-08-19 05:36:33
39.45.36.191 attack
Brute Force
2020-08-19 05:26:36
106.52.243.17 attackbots
Aug 18 21:22:47 onepixel sshd[113996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.243.17 
Aug 18 21:22:47 onepixel sshd[113996]: Invalid user web from 106.52.243.17 port 57012
Aug 18 21:22:49 onepixel sshd[113996]: Failed password for invalid user web from 106.52.243.17 port 57012 ssh2
Aug 18 21:26:52 onepixel sshd[116279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.243.17  user=root
Aug 18 21:26:54 onepixel sshd[116279]: Failed password for root from 106.52.243.17 port 45146 ssh2
2020-08-19 05:44:09
103.146.23.110 attack
Attempted connection to port 445.
2020-08-19 05:52:05
103.48.190.32 attackspambots
Aug 18 23:47:53 fhem-rasp sshd[31630]: Invalid user plo from 103.48.190.32 port 48210
...
2020-08-19 05:58:31
202.62.59.28 attackbotsspam
Attempted connection to port 8080.
2020-08-19 05:33:32
125.174.217.96 attackspambots
Attempted connection to port 2323.
2020-08-19 05:47:02

Recently Reported IPs

104.144.240.222 51.83.69.23 161.10.238.226 45.229.140.7
95.79.57.95 217.100.213.170 51.15.226.72 1.54.161.77
3.92.241.146 80.82.67.161 5.9.31.26 193.92.241.162
200.222.220.246 177.158.178.87 112.33.13.139 113.160.250.158
95.29.146.171 200.107.59.83 190.7.252.83 91.241.235.187