Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Taipei

Region: Taipei City

Country: Taiwan, China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
220.133.149.167 attackbots
Port Scan
...
2020-09-01 03:34:02
220.133.141.88 attack
Unauthorized connection attempt detected from IP address 220.133.141.88 to port 81
2020-07-25 22:00:41
220.133.142.120 attackbots
Attempted connection to port 8080.
2020-06-17 08:34:51
220.133.146.46 attack
 TCP (SYN) 220.133.146.46:45071 -> port 23, len 40
2020-05-28 21:56:45
220.133.142.124 attackbotsspam
2323/tcp 23/tcp...
[2020-04-29/05-22]4pkt,2pt.(tcp)
2020-05-23 05:07:46
220.133.147.244 attackspambots
Mar  7 22:10:03 system,error,critical: login failure for user admin from 220.133.147.244 via telnet
Mar  7 22:10:04 system,error,critical: login failure for user root from 220.133.147.244 via telnet
Mar  7 22:10:06 system,error,critical: login failure for user root from 220.133.147.244 via telnet
Mar  7 22:10:09 system,error,critical: login failure for user root from 220.133.147.244 via telnet
Mar  7 22:10:10 system,error,critical: login failure for user Administrator from 220.133.147.244 via telnet
Mar  7 22:10:12 system,error,critical: login failure for user supervisor from 220.133.147.244 via telnet
Mar  7 22:10:15 system,error,critical: login failure for user admin1 from 220.133.147.244 via telnet
Mar  7 22:10:16 system,error,critical: login failure for user root from 220.133.147.244 via telnet
Mar  7 22:10:18 system,error,critical: login failure for user root from 220.133.147.244 via telnet
Mar  7 22:10:21 system,error,critical: login failure for user root from 220.133.147.244 via telnet
2020-03-08 06:32:08
220.133.145.176 attack
suspicious action Sat, 29 Feb 2020 11:26:39 -0300
2020-02-29 23:44:13
220.133.148.28 normal
Normal IP
2020-02-22 20:38:48
220.133.145.176 attack
unauthorized connection attempt
2020-02-19 16:45:55
220.133.141.247 attack
Honeypot attack, port: 81, PTR: 220-133-141-247.HINET-IP.hinet.net.
2020-02-14 20:05:19
220.133.143.224 attackspambots
Unauthorized connection attempt detected from IP address 220.133.143.224 to port 4567 [J]
2020-01-29 09:10:58
220.133.141.57 attackbotsspam
Unauthorized connection attempt detected from IP address 220.133.141.57 to port 81 [J]
2020-01-07 16:18:56
220.133.141.57 attackbots
19/11/20@01:26:00: FAIL: IoT-Telnet address from=220.133.141.57
...
2019-11-20 18:05:15
220.133.148.28 attackbots
23/tcp 9001/tcp 34567/tcp
[2019-09-21/11-01]3pkt
2019-11-01 13:15:21
220.133.148.28 attack
firewall-block, port(s): 34567/tcp
2019-10-07 02:00:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.133.14.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47153
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.133.14.164.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051601 1800 900 604800 86400

;; Query time: 673 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 06:31:59 CST 2020
;; MSG SIZE  rcvd: 118
Host info
164.14.133.220.in-addr.arpa domain name pointer 220-133-14-164.HINET-IP.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.14.133.220.in-addr.arpa	name = 220-133-14-164.HINET-IP.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.91.225.3 attackspambots
20/7/24@03:50:58: FAIL: Alarm-Network address from=61.91.225.3
20/7/24@03:50:58: FAIL: Alarm-Network address from=61.91.225.3
...
2020-07-24 19:01:15
188.162.249.107 attackbots
Unauthorized connection attempt from IP address 188.162.249.107 on Port 445(SMB)
2020-07-24 18:37:02
113.174.53.86 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-07-24 19:08:47
87.251.120.24 attack
Port probing on unauthorized port 445
2020-07-24 18:42:52
192.241.238.9 attackbotsspam
[Sat Jul 18 16:15:54 2020] - DDoS Attack From IP: 192.241.238.9 Port: 38250
2020-07-24 18:52:09
117.4.243.72 attackspam
Unauthorized connection attempt detected from IP address 117.4.243.72 to port 445
2020-07-24 19:08:20
36.25.191.79 attack
Unauthorized connection attempt detected from IP address 36.25.191.79 to port 445
2020-07-24 19:11:05
51.77.41.246 attack
Invalid user info from 51.77.41.246 port 39244
2020-07-24 18:56:59
54.36.148.22 attack
Automatic report - Banned IP Access
2020-07-24 18:46:22
171.100.115.78 attack
Unauthorized connection attempt from IP address 171.100.115.78 on Port 445(SMB)
2020-07-24 19:12:17
189.207.102.59 attack
Automatic report - Port Scan Attack
2020-07-24 19:05:36
151.80.173.36 attackbots
Jul 24 09:31:24 vps647732 sshd[18003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.173.36
Jul 24 09:31:26 vps647732 sshd[18003]: Failed password for invalid user wagner from 151.80.173.36 port 43817 ssh2
...
2020-07-24 18:50:03
201.184.183.26 attack
Invalid user tibero2 from 201.184.183.26 port 43888
2020-07-24 18:44:40
51.75.121.252 attackbots
Invalid user isaac from 51.75.121.252 port 37096
2020-07-24 18:38:47
88.218.16.134 attackbotsspam
[portscan] udp/3702 [ws-discovery]
*(RWIN=-)(07241135)
2020-07-24 19:06:39

Recently Reported IPs

137.204.198.125 2.98.87.51 173.190.223.109 101.161.153.244
62.122.223.50 212.58.198.159 183.242.177.98 201.45.95.9
3.143.138.126 139.134.223.152 151.48.23.167 172.15.2.53
193.79.173.176 45.70.166.227 200.228.209.136 163.191.96.116
105.27.224.11 73.158.13.179 174.197.44.191 111.161.71.154