Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uganda

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.83.252.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32803
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.83.252.4.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 21 19:30:19 CST 2023
;; MSG SIZE  rcvd: 105
Host info
4.252.83.102.in-addr.arpa domain name pointer 4-252-83-102.r.airtel.ug.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.252.83.102.in-addr.arpa	name = 4-252-83-102.r.airtel.ug.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.126.125.210 attack
Honeypot attack, port: 81, PTR: 59-126-125-210.HINET-IP.hinet.net.
2020-06-06 07:00:39
216.57.160.47 attack
Jun  2 18:18:21 dns-3 sshd[19167]: User r.r from 216.57.160.47 not allowed because not listed in AllowUsers
Jun  2 18:18:21 dns-3 sshd[19167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.57.160.47  user=r.r
Jun  2 18:18:24 dns-3 sshd[19167]: Failed password for invalid user r.r from 216.57.160.47 port 45012 ssh2
Jun  2 18:18:24 dns-3 sshd[19167]: Received disconnect from 216.57.160.47 port 45012:11: Bye Bye [preauth]
Jun  2 18:18:24 dns-3 sshd[19167]: Disconnected from invalid user r.r 216.57.160.47 port 45012 [preauth]
Jun  2 18:26:22 dns-3 sshd[19253]: User r.r from 216.57.160.47 not allowed because not listed in AllowUsers
Jun  2 18:26:22 dns-3 sshd[19253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.57.160.47  user=r.r
Jun  2 18:26:24 dns-3 sshd[19253]: Failed password for invalid user r.r from 216.57.160.47 port 54956 ssh2
Jun  2 18:26:25 dns-3 sshd[19253]: Received disc........
-------------------------------
2020-06-06 06:34:56
58.87.114.13 attackspambots
2020-06-05T23:48:54.272498vps751288.ovh.net sshd\[32309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
2020-06-05T23:48:56.837429vps751288.ovh.net sshd\[32309\]: Failed password for root from 58.87.114.13 port 44162 ssh2
2020-06-05T23:53:28.352454vps751288.ovh.net sshd\[32327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
2020-06-05T23:53:30.531218vps751288.ovh.net sshd\[32327\]: Failed password for root from 58.87.114.13 port 47644 ssh2
2020-06-05T23:58:02.060607vps751288.ovh.net sshd\[32361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.114.13  user=root
2020-06-06 06:43:10
196.36.1.106 attack
Jun  5 22:05:17 ns382633 sshd\[24641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.36.1.106  user=root
Jun  5 22:05:18 ns382633 sshd\[24641\]: Failed password for root from 196.36.1.106 port 35604 ssh2
Jun  5 22:18:21 ns382633 sshd\[26872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.36.1.106  user=root
Jun  5 22:18:23 ns382633 sshd\[26872\]: Failed password for root from 196.36.1.106 port 46800 ssh2
Jun  5 22:26:48 ns382633 sshd\[28576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.36.1.106  user=root
2020-06-06 06:27:41
159.65.158.30 attackspam
Jun  6 03:19:12 gw1 sshd[5789]: Failed password for root from 159.65.158.30 port 42020 ssh2
...
2020-06-06 06:31:58
125.43.68.83 attackbotsspam
odoo8
...
2020-06-06 07:02:29
202.181.233.245 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-06 06:23:49
37.49.226.129 attackbots
Jun  6 01:44:27 server2 sshd\[9156\]: User root from 37.49.226.129 not allowed because not listed in AllowUsers
Jun  6 01:44:50 server2 sshd\[9164\]: User root from 37.49.226.129 not allowed because not listed in AllowUsers
Jun  6 01:45:13 server2 sshd\[9356\]: User root from 37.49.226.129 not allowed because not listed in AllowUsers
Jun  6 01:45:31 server2 sshd\[9363\]: Invalid user admin from 37.49.226.129
Jun  6 01:45:48 server2 sshd\[9379\]: Invalid user admin from 37.49.226.129
Jun  6 01:46:05 server2 sshd\[9406\]: Invalid user ubuntu from 37.49.226.129
2020-06-06 06:54:45
60.199.131.62 attackspam
Jun  6 00:18:20 ns381471 sshd[15207]: Failed password for root from 60.199.131.62 port 40350 ssh2
2020-06-06 07:01:58
51.77.146.170 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-06 06:59:58
181.57.152.138 attack
Port probing on unauthorized port 22
2020-06-06 06:48:24
212.175.140.10 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-06 06:30:13
156.218.121.87 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-06-06 06:28:12
91.231.113.113 attackbotsspam
Jun  5 18:47:44 NPSTNNYC01T sshd[26257]: Failed password for root from 91.231.113.113 port 11790 ssh2
Jun  5 18:51:27 NPSTNNYC01T sshd[26584]: Failed password for root from 91.231.113.113 port 30830 ssh2
...
2020-06-06 06:59:03
106.12.80.246 attackspam
SASL PLAIN auth failed: ruser=...
2020-06-06 06:45:47

Recently Reported IPs

102.83.121.15 102.83.134.24 102.83.126.244 102.82.85.249
102.83.108.206 102.82.84.127 102.82.52.25 102.83.4.83
102.82.237.111 102.82.228.174 102.82.202.236 102.82.67.172
102.83.49.153 102.82.214.92 102.82.208.71 102.82.31.186
102.82.68.11 102.82.98.40 102.82.129.161 102.82.136.23