Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.119.139.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32463
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.119.139.100.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 02:11:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 100.139.119.33.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 33.119.139.100.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.89.250.23 attackspam
49.89.250.23 - - [08/Aug/2020:15:45:14 +0200] "POST /inc/md5.asp HTTP/1.1" 404 17548 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:16 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11780 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:25 +0200] "POST /inc/md5.asp HTTP/1.1" 404 17341 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:27 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11923 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:28 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11926 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
...
2020-08-08 22:59:22
102.164.230.10 attackspambots
Unauthorized connection attempt from IP address 102.164.230.10 on Port 445(SMB)
2020-08-08 23:06:10
168.197.226.209 attack
Brazil www.telemidia.net.br hacking server, IP: 168.197.226.209 Hostname: 226-197-168-209.andradas-net.com.br
Human/Bot: Bot
Mozilla/5.0 (Windows NT 5.1; rv:9.0.1) Gecko/20100101 Firefox/9.0.1
2020-08-08 23:03:02
149.56.107.216 attackspam
Aug  8 16:53:29 ip106 sshd[30425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.107.216 
Aug  8 16:53:31 ip106 sshd[30425]: Failed password for invalid user roberto from 149.56.107.216 port 58968 ssh2
...
2020-08-08 23:05:43
177.149.159.92 attackspam
Unauthorized connection attempt from IP address 177.149.159.92 on Port 445(SMB)
2020-08-08 23:17:04
115.221.245.55 attack
MAIL: User Login Brute Force Attempt
2020-08-08 22:50:51
220.133.18.137 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-08 23:19:47
183.145.204.65 attackbotsspam
Lines containing failures of 183.145.204.65
Aug  8 08:56:03 neweola sshd[5294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.145.204.65  user=r.r
Aug  8 08:56:04 neweola sshd[5294]: Failed password for r.r from 183.145.204.65 port 55622 ssh2
Aug  8 08:56:06 neweola sshd[5294]: Received disconnect from 183.145.204.65 port 55622:11: Bye Bye [preauth]
Aug  8 08:56:06 neweola sshd[5294]: Disconnected from authenticating user r.r 183.145.204.65 port 55622 [preauth]
Aug  8 09:14:40 neweola sshd[6203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.145.204.65  user=r.r
Aug  8 09:14:42 neweola sshd[6203]: Failed password for r.r from 183.145.204.65 port 43384 ssh2
Aug  8 09:14:43 neweola sshd[6203]: Received disconnect from 183.145.204.65 port 43384:11: Bye Bye [preauth]
Aug  8 09:14:43 neweola sshd[6203]: Disconnected from authenticating user r.r 183.145.204.65 port 43384 [preauth]
Aug  ........
------------------------------
2020-08-08 23:20:01
52.230.7.48 attackbots
Multiple SSH authentication failures from 52.230.7.48
2020-08-08 23:27:27
139.155.42.212 attackspam
Lines containing failures of 139.155.42.212
Aug  3 06:01:53 shared05 sshd[19650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212  user=r.r
Aug  3 06:01:55 shared05 sshd[19650]: Failed password for r.r from 139.155.42.212 port 54814 ssh2
Aug  3 06:01:56 shared05 sshd[19650]: Received disconnect from 139.155.42.212 port 54814:11: Bye Bye [preauth]
Aug  3 06:01:56 shared05 sshd[19650]: Disconnected from authenticating user r.r 139.155.42.212 port 54814 [preauth]
Aug  3 06:16:35 shared05 sshd[24946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.42.212  user=r.r
Aug  3 06:16:37 shared05 sshd[24946]: Failed password for r.r from 139.155.42.212 port 57072 ssh2
Aug  3 06:16:41 shared05 sshd[24946]: Received disconnect from 139.155.42.212 port 57072:11: Bye Bye [preauth]
Aug  3 06:16:41 shared05 sshd[24946]: Disconnected from authenticating user r.r 139.155.42.212 port 57072........
------------------------------
2020-08-08 23:11:27
180.254.47.149 attackbots
Unauthorized connection attempt from IP address 180.254.47.149 on Port 445(SMB)
2020-08-08 23:07:55
123.22.38.181 attackspambots
08/08/2020-08:15:14.739535 123.22.38.181 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-08 23:15:03
51.91.116.150 attack
Aug  8 16:41:17 vps sshd[14147]: Failed password for root from 51.91.116.150 port 56988 ssh2
...
2020-08-08 23:29:44
202.158.47.18 attackspam
Dovecot Invalid User Login Attempt.
2020-08-08 23:31:50
142.4.14.247 attack
142.4.14.247 - - [08/Aug/2020:14:07:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [08/Aug/2020:14:07:07 +0100] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [08/Aug/2020:14:07:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-08 23:23:48

Recently Reported IPs

14.7.48.142 211.104.227.249 135.248.236.151 224.218.187.84
24.153.151.103 15.137.85.118 252.154.90.210 117.8.40.52
36.43.49.96 172.207.7.136 119.148.218.218 179.153.85.185
67.138.117.174 132.95.22.196 136.228.214.88 207.101.244.135
85.119.41.106 245.53.171.234 52.58.138.77 108.142.114.117