Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.131.29.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.131.29.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:26:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 142.29.131.33.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 33.131.29.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
199.195.251.37 attack
scan r
2019-07-11 19:43:11
186.151.170.222 attack
Jul 11 05:45:24 cvbmail sshd\[5008\]: Invalid user leng from 186.151.170.222
Jul 11 05:45:24 cvbmail sshd\[5008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.151.170.222
Jul 11 05:45:26 cvbmail sshd\[5008\]: Failed password for invalid user leng from 186.151.170.222 port 39768 ssh2
2019-07-11 19:03:37
185.176.27.42 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 19:11:30
77.42.116.6 attackspam
23/tcp
[2019-07-11]1pkt
2019-07-11 19:02:18
189.18.87.30 attackspambots
8080/tcp
[2019-07-11]1pkt
2019-07-11 19:45:49
134.209.106.112 attackbotsspam
Jul 11 11:14:52 ArkNodeAT sshd\[11058\]: Invalid user leila from 134.209.106.112
Jul 11 11:14:52 ArkNodeAT sshd\[11058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.112
Jul 11 11:14:54 ArkNodeAT sshd\[11058\]: Failed password for invalid user leila from 134.209.106.112 port 35992 ssh2
2019-07-11 19:50:42
217.112.128.224 attackbotsspam
Postfix DNSBL listed. Trying to send SPAM.
2019-07-11 19:37:17
114.37.18.27 attack
37215/tcp
[2019-07-11]1pkt
2019-07-11 19:57:33
174.138.56.93 attackbots
Jul 11 13:27:31 rpi sshd[20528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.56.93 
Jul 11 13:27:33 rpi sshd[20528]: Failed password for invalid user ch from 174.138.56.93 port 40430 ssh2
2019-07-11 19:29:03
113.25.104.57 attack
Jul 11 11:06:00 master sshd[15626]: Failed password for root from 113.25.104.57 port 43426 ssh2
Jul 11 11:06:03 master sshd[15626]: Failed password for root from 113.25.104.57 port 43426 ssh2
Jul 11 11:06:07 master sshd[15626]: Failed password for root from 113.25.104.57 port 43426 ssh2
2019-07-11 19:32:49
113.237.169.56 attackbotsspam
23/tcp
[2019-07-11]1pkt
2019-07-11 19:26:21
88.249.64.9 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 20:04:05
142.93.237.233 attackspam
$f2bV_matches
2019-07-11 19:30:17
176.159.248.98 attackspambots
Netgear DGN Device Remote Command Execution Vulnerability
2019-07-11 19:08:33
175.198.214.202 attack
Brute force attempt
2019-07-11 19:34:50

Recently Reported IPs

104.50.139.237 58.125.216.2 138.27.229.88 180.225.122.213
253.242.68.196 255.79.35.3 82.162.206.58 73.41.137.247
65.58.187.210 127.255.10.205 209.207.50.78 128.162.51.163
250.241.162.93 187.63.137.208 19.161.223.136 244.63.236.102
64.38.197.36 167.135.133.180 47.104.9.6 58.34.128.199