Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.36.142.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.36.142.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 20:31:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 20.142.36.33.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.142.36.33.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.142 attack
May 16 04:59:22 abendstille sshd\[27675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
May 16 04:59:25 abendstille sshd\[27675\]: Failed password for root from 222.186.180.142 port 11294 ssh2
May 16 04:59:31 abendstille sshd\[27732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
May 16 04:59:33 abendstille sshd\[27732\]: Failed password for root from 222.186.180.142 port 12796 ssh2
May 16 04:59:37 abendstille sshd\[27732\]: Failed password for root from 222.186.180.142 port 12796 ssh2
...
2020-05-16 16:01:50
129.226.161.114 attackbotsspam
May 15 22:49:16 ny01 sshd[2080]: Failed password for root from 129.226.161.114 port 59104 ssh2
May 15 22:55:00 ny01 sshd[2990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.161.114
May 15 22:55:02 ny01 sshd[2990]: Failed password for invalid user webcam from 129.226.161.114 port 40778 ssh2
2020-05-16 16:15:11
222.186.180.41 attackbots
$f2bV_matches
2020-05-16 15:38:26
211.144.69.249 attackbots
Invalid user amv from 211.144.69.249 port 9644
2020-05-16 16:11:31
157.245.12.36 attackspam
2020-05-16 03:06:13,645 fail2ban.actions: WARNING [ssh] Ban 157.245.12.36
2020-05-16 16:11:03
49.88.112.112 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-05-16 16:02:39
186.232.119.84 attack
May 16 04:18:26 ns382633 sshd\[11613\]: Invalid user ts3server3 from 186.232.119.84 port 38968
May 16 04:18:26 ns382633 sshd\[11613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.232.119.84
May 16 04:18:27 ns382633 sshd\[11613\]: Failed password for invalid user ts3server3 from 186.232.119.84 port 38968 ssh2
May 16 04:26:12 ns382633 sshd\[13093\]: Invalid user test from 186.232.119.84 port 49924
May 16 04:26:12 ns382633 sshd\[13093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.232.119.84
2020-05-16 16:07:53
92.222.216.222 attackspambots
May 16 04:45:30 eventyay sshd[19529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.216.222
May 16 04:45:32 eventyay sshd[19529]: Failed password for invalid user user from 92.222.216.222 port 54678 ssh2
May 16 04:48:53 eventyay sshd[19635]: Failed password for root from 92.222.216.222 port 53648 ssh2
...
2020-05-16 15:59:26
139.226.173.83 attack
SSH brute force attempt
2020-05-16 15:38:56
174.58.52.23 attackspambots
Unauthorized connection attempt detected from IP address 174.58.52.23 to port 23
2020-05-16 15:57:00
106.54.202.136 attackbotsspam
May 16 04:30:39 meumeu sshd[108518]: Invalid user us from 106.54.202.136 port 42296
May 16 04:30:39 meumeu sshd[108518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.202.136 
May 16 04:30:39 meumeu sshd[108518]: Invalid user us from 106.54.202.136 port 42296
May 16 04:30:41 meumeu sshd[108518]: Failed password for invalid user us from 106.54.202.136 port 42296 ssh2
May 16 04:32:52 meumeu sshd[108754]: Invalid user john from 106.54.202.136 port 38636
May 16 04:32:52 meumeu sshd[108754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.202.136 
May 16 04:32:52 meumeu sshd[108754]: Invalid user john from 106.54.202.136 port 38636
May 16 04:32:54 meumeu sshd[108754]: Failed password for invalid user john from 106.54.202.136 port 38636 ssh2
May 16 04:35:14 meumeu sshd[109118]: Invalid user raghu from 106.54.202.136 port 34972
...
2020-05-16 16:05:42
113.200.160.135 attackbotsspam
May 13 14:30:01 lanister sshd[22912]: Invalid user oracle from 113.200.160.135
May 13 14:30:01 lanister sshd[22912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.200.160.135
May 13 14:30:01 lanister sshd[22912]: Invalid user oracle from 113.200.160.135
May 13 14:30:03 lanister sshd[22912]: Failed password for invalid user oracle from 113.200.160.135 port 35575 ssh2
2020-05-16 15:55:58
129.204.63.100 attackspambots
May 16 02:08:36 localhost sshd\[4612\]: Invalid user rtkit from 129.204.63.100
May 16 02:08:36 localhost sshd\[4612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.63.100
May 16 02:08:39 localhost sshd\[4612\]: Failed password for invalid user rtkit from 129.204.63.100 port 40836 ssh2
May 16 02:13:04 localhost sshd\[4842\]: Invalid user suneel from 129.204.63.100
May 16 02:13:04 localhost sshd\[4842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.63.100
...
2020-05-16 16:18:06
222.186.175.169 attackbots
May 16 04:43:08 abendstille sshd\[12024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
May 16 04:43:10 abendstille sshd\[12024\]: Failed password for root from 222.186.175.169 port 8754 ssh2
May 16 04:43:30 abendstille sshd\[12147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
May 16 04:43:32 abendstille sshd\[12147\]: Failed password for root from 222.186.175.169 port 25410 ssh2
May 16 04:43:52 abendstille sshd\[12545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
...
2020-05-16 15:56:46
212.129.57.201 attackbots
May 16 01:53:36 ip-172-31-61-156 sshd[6544]: Failed password for invalid user gmodserver from 212.129.57.201 port 45573 ssh2
May 16 01:53:34 ip-172-31-61-156 sshd[6544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.57.201
May 16 01:53:34 ip-172-31-61-156 sshd[6544]: Invalid user gmodserver from 212.129.57.201
May 16 01:53:36 ip-172-31-61-156 sshd[6544]: Failed password for invalid user gmodserver from 212.129.57.201 port 45573 ssh2
May 16 01:57:50 ip-172-31-61-156 sshd[6699]: Invalid user lin from 212.129.57.201
...
2020-05-16 16:20:08

Recently Reported IPs

107.20.160.56 153.140.215.164 179.185.19.248 203.48.153.46
128.51.216.70 67.174.67.94 132.42.224.86 25.248.96.90
245.5.144.220 133.28.172.74 133.160.96.131 231.93.224.21
174.222.128.164 247.154.5.226 218.228.63.166 155.16.89.130
94.148.202.224 66.45.22.171 18.0.29.193 114.129.174.166