Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.133.193.94 botsattackproxy
Bad IP: Web Form Spammer
2025-06-17 13:29:21
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.133.193.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.133.193.14.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:32:22 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 14.193.133.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 45.133.193.14.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
171.237.248.234 attack
Unauthorized connection attempt from IP address 171.237.248.234 on Port 445(SMB)
2020-06-17 04:22:50
58.23.16.254 attackbots
Jun 17 01:34:14 dhoomketu sshd[801678]: Invalid user speedtest from 58.23.16.254 port 44434
Jun 17 01:34:14 dhoomketu sshd[801678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.23.16.254 
Jun 17 01:34:14 dhoomketu sshd[801678]: Invalid user speedtest from 58.23.16.254 port 44434
Jun 17 01:34:15 dhoomketu sshd[801678]: Failed password for invalid user speedtest from 58.23.16.254 port 44434 ssh2
Jun 17 01:35:33 dhoomketu sshd[801693]: Invalid user user1 from 58.23.16.254 port 63370
...
2020-06-17 04:13:36
36.73.28.131 attackbots
Unauthorized connection attempt from IP address 36.73.28.131 on Port 445(SMB)
2020-06-17 04:36:15
180.157.255.60 attack
Unauthorized connection attempt from IP address 180.157.255.60 on Port 445(SMB)
2020-06-17 04:29:12
104.248.119.251 attackbotsspam
 TCP (SYN) 104.248.119.251:51939 -> port 52869, len 40
2020-06-17 04:27:47
51.255.35.41 attackspam
(sshd) Failed SSH login from 51.255.35.41 (FR/France/41.ip-51-255-35.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 16 20:39:48 amsweb01 sshd[16250]: Invalid user down from 51.255.35.41 port 45226
Jun 16 20:39:51 amsweb01 sshd[16250]: Failed password for invalid user down from 51.255.35.41 port 45226 ssh2
Jun 16 20:47:16 amsweb01 sshd[17394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.35.41  user=root
Jun 16 20:47:19 amsweb01 sshd[17394]: Failed password for root from 51.255.35.41 port 36733 ssh2
Jun 16 20:50:58 amsweb01 sshd[17828]: Invalid user vagrant from 51.255.35.41 port 36125
2020-06-17 04:25:05
198.20.87.98 attackspambots
TCP ports : 102 / 2002 / 3541 / 8083 / 8649 / 12345 / 20256 / 25105; UDP ports : 5008 / 11211
2020-06-17 04:50:09
42.113.159.26 attackspam
Unauthorized connection attempt from IP address 42.113.159.26 on Port 445(SMB)
2020-06-17 04:34:59
122.97.215.50 attackspambots
Unauthorized connection attempt detected from IP address 122.97.215.50 to port 80
2020-06-17 04:40:25
103.250.145.150 attackspambots
Unauthorized connection attempt from IP address 103.250.145.150 on Port 445(SMB)
2020-06-17 04:26:43
61.12.26.145 attack
" "
2020-06-17 04:51:57
201.243.245.43 attackspambots
Unauthorized connection attempt from IP address 201.243.245.43 on Port 445(SMB)
2020-06-17 04:19:53
151.80.155.98 attack
Jun 16 19:45:13 vpn01 sshd[1580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98
Jun 16 19:45:14 vpn01 sshd[1580]: Failed password for invalid user developer from 151.80.155.98 port 39482 ssh2
...
2020-06-17 04:41:15
85.106.55.172 attackbots
Unauthorized connection attempt from IP address 85.106.55.172 on Port 445(SMB)
2020-06-17 04:24:09
209.150.146.126 attack
Unauthorized connection attempt from IP address 209.150.146.126 on Port 445(SMB)
2020-06-17 04:19:01

Recently Reported IPs

83.132.98.240 58.255.14.228 185.246.208.135 121.4.52.29
113.161.196.112 103.237.56.77 43.156.47.242 103.233.0.18
222.139.25.60 115.73.47.126 118.167.242.122 43.254.160.58
112.237.13.12 181.44.92.231 223.91.85.215 197.49.88.147
122.170.111.128 123.4.20.237 139.170.70.32 202.89.142.119