Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.201.196.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.201.196.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:24:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.196.201.33.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 33.201.196.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.189.223.207 attackbots
Brute-Force reported by Fail2Ban
2020-03-20 05:05:08
54.36.241.186 attackspam
Invalid user nicolas from 54.36.241.186 port 48606
2020-03-20 04:40:04
103.129.222.135 attack
Mar 19 20:09:30 tuxlinux sshd[40295]: Invalid user fossil from 103.129.222.135 port 39989
Mar 19 20:09:30 tuxlinux sshd[40295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 
Mar 19 20:09:30 tuxlinux sshd[40295]: Invalid user fossil from 103.129.222.135 port 39989
Mar 19 20:09:30 tuxlinux sshd[40295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135 
...
2020-03-20 04:36:43
156.223.116.92 attack
Invalid user admin from 156.223.116.92 port 43794
2020-03-20 04:54:37
106.13.43.117 attackspam
Fail2Ban - SSH Bruteforce Attempt
2020-03-20 04:35:45
49.235.135.230 attack
SSH Brute-Force attacks
2020-03-20 05:08:39
37.59.224.39 attackbotsspam
SSH Invalid Login
2020-03-20 05:10:20
81.201.60.150 attackspam
Mar 19 11:47:48 NPSTNNYC01T sshd[15067]: Failed password for root from 81.201.60.150 port 54469 ssh2
Mar 19 11:54:48 NPSTNNYC01T sshd[15434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.201.60.150
Mar 19 11:54:50 NPSTNNYC01T sshd[15434]: Failed password for invalid user superuser from 81.201.60.150 port 36863 ssh2
...
2020-03-20 04:38:34
46.101.113.206 attackspambots
Mar 18 17:59:16 s02-markstaller sshd[3605]: Failed password for r.r from 46.101.113.206 port 55714 ssh2
Mar 18 18:13:18 s02-markstaller sshd[4484]: Invalid user zhengyifan from 46.101.113.206
Mar 18 18:13:20 s02-markstaller sshd[4484]: Failed password for invalid user zhengyifan from 46.101.113.206 port 50786 ssh2
Mar 18 18:16:37 s02-markstaller sshd[4654]: Failed password for r.r from 46.101.113.206 port 35186 ssh2
Mar 18 18:19:49 s02-markstaller sshd[6877]: Invalid user kristofvps from 46.101.113.206
Mar 18 18:19:51 s02-markstaller sshd[6877]: Failed password for invalid user kristofvps from 46.101.113.206 port 47818 ssh2
Mar 18 18:23:03 s02-markstaller sshd[7039]: Failed password for r.r from 46.101.113.206 port 60450 ssh2
Mar 18 18:26:19 s02-markstaller sshd[7189]: Invalid user gmodserver from 46.101.113.206
Mar 18 18:26:21 s02-markstaller sshd[7189]: Failed password for invalid user gmodserver from 46.101.113.206 port 44854 ssh2
Mar 18 18:29:35 s02-markstaller sshd[........
------------------------------
2020-03-20 04:43:07
103.97.3.247 attackspam
Invalid user kevin from 103.97.3.247 port 34726
2020-03-20 04:37:16
51.15.51.2 attack
Invalid user admin from 51.15.51.2 port 34432
2020-03-20 04:42:01
106.12.57.149 attack
Invalid user es from 106.12.57.149 port 47592
2020-03-20 05:02:34
59.148.173.231 attack
Mar 19 21:06:08 nextcloud sshd\[27278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.148.173.231  user=root
Mar 19 21:06:10 nextcloud sshd\[27278\]: Failed password for root from 59.148.173.231 port 56020 ssh2
Mar 19 21:22:47 nextcloud sshd\[14585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.148.173.231  user=root
2020-03-20 05:07:56
51.75.208.177 attack
Invalid user upload from 51.75.208.177 port 58768
2020-03-20 04:40:22
159.65.180.64 attack
Invalid user admins from 159.65.180.64 port 38194
2020-03-20 04:53:40

Recently Reported IPs

201.18.46.28 53.81.212.108 62.181.253.240 149.62.72.187
62.191.124.77 247.131.55.2 70.133.34.153 78.121.198.222
189.191.106.127 141.128.32.35 26.33.5.134 171.161.91.83
58.201.155.208 133.73.134.194 124.246.105.33 222.18.1.209
199.49.17.50 45.66.86.92 240.53.97.216 134.64.176.240