Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 123.139.83.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;123.139.83.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 12:00:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 28.83.139.123.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.83.139.123.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.152.107.131 attack
188.152.107.131 - - [08/Aug/2020:23:05:23 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.152.107.131 - - [08/Aug/2020:23:05:29 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.152.107.131 - - [08/Aug/2020:23:05:32 +0100] "POST /wp-login.php HTTP/1.1" 302 5 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 07:16:00
139.198.5.138 attackbots
2020-08-08T22:33:40.987019shield sshd\[14974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.138  user=root
2020-08-08T22:33:43.064783shield sshd\[14974\]: Failed password for root from 139.198.5.138 port 33784 ssh2
2020-08-08T22:36:54.714504shield sshd\[16364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.138  user=root
2020-08-08T22:36:56.089971shield sshd\[16364\]: Failed password for root from 139.198.5.138 port 25968 ssh2
2020-08-08T22:40:14.784142shield sshd\[17955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.138  user=root
2020-08-09 06:47:34
220.135.43.81 attackspam
Aug  8 23:25:46 venus kernel: [109451.073383] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:66:8f:ed:d2:74:7f:6e:37:e3:08:00 SRC=220.135.43.81 DST=78.47.70.226 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=51319 PROTO=TCP SPT=15410 DPT=9530 WINDOW=4663 RES=0x00 SYN URGP=0
2020-08-09 06:59:35
120.244.110.25 attackspam
Aug  5 16:31:47 cumulus sshd[8879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.110.25  user=r.r
Aug  5 16:31:49 cumulus sshd[8879]: Failed password for r.r from 120.244.110.25 port 3467 ssh2
Aug  5 16:31:49 cumulus sshd[8879]: Received disconnect from 120.244.110.25 port 3467:11: Bye Bye [preauth]
Aug  5 16:31:49 cumulus sshd[8879]: Disconnected from 120.244.110.25 port 3467 [preauth]
Aug  5 16:35:49 cumulus sshd[9150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.110.25  user=r.r
Aug  5 16:35:51 cumulus sshd[9150]: Failed password for r.r from 120.244.110.25 port 3174 ssh2
Aug  5 16:35:51 cumulus sshd[9150]: Received disconnect from 120.244.110.25 port 3174:11: Bye Bye [preauth]
Aug  5 16:35:51 cumulus sshd[9150]: Disconnected from 120.244.110.25 port 3174 [preauth]
Aug  5 16:39:49 cumulus sshd[9629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0........
-------------------------------
2020-08-09 07:11:59
176.178.130.190 attack
SERVER-WEBAPP MVPower DVR Shell arbitrary command execution attempt
2020-08-09 07:16:30
45.78.43.205 attack
2020-08-09T00:13:46.429885vps773228.ovh.net sshd[4604]: Failed password for root from 45.78.43.205 port 50508 ssh2
2020-08-09T00:17:35.162745vps773228.ovh.net sshd[4630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.78.43.205  user=root
2020-08-09T00:17:36.763620vps773228.ovh.net sshd[4630]: Failed password for root from 45.78.43.205 port 34180 ssh2
2020-08-09T00:21:20.099388vps773228.ovh.net sshd[4676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.78.43.205  user=root
2020-08-09T00:21:22.588526vps773228.ovh.net sshd[4676]: Failed password for root from 45.78.43.205 port 46052 ssh2
...
2020-08-09 07:02:16
49.232.148.100 attack
Aug  8 23:14:04 rocket sshd[20587]: Failed password for root from 49.232.148.100 port 37404 ssh2
Aug  8 23:18:15 rocket sshd[21258]: Failed password for root from 49.232.148.100 port 44776 ssh2
...
2020-08-09 06:46:09
106.54.86.87 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-09 07:17:50
171.96.190.165 attack
reported through recidive - multiple failed attempts(SSH)
2020-08-09 07:05:03
103.123.8.75 attackspam
Aug  8 22:21:02 sso sshd[18470]: Failed password for root from 103.123.8.75 port 41598 ssh2
...
2020-08-09 07:07:49
165.22.77.163 attackbots
2020-08-08T23:49:12.287685+02:00  sshd[6440]: Failed password for root from 165.22.77.163 port 52718 ssh2
2020-08-09 07:21:36
196.42.48.189 attackbotsspam
Automatic report - Port Scan Attack
2020-08-09 07:05:53
140.143.228.227 attackspambots
Aug  9 01:20:35 gw1 sshd[8916]: Failed password for root from 140.143.228.227 port 38454 ssh2
...
2020-08-09 06:47:21
111.93.205.186 attack
Aug  8 22:40:10 rush sshd[4657]: Failed password for root from 111.93.205.186 port 50099 ssh2
Aug  8 22:45:06 rush sshd[4868]: Failed password for root from 111.93.205.186 port 55666 ssh2
...
2020-08-09 06:53:00
185.220.101.216 attackbots
Aug  8 22:25:44 ns382633 sshd\[29846\]: Invalid user admin from 185.220.101.216 port 5014
Aug  8 22:25:44 ns382633 sshd\[29846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.216
Aug  8 22:25:46 ns382633 sshd\[29846\]: Failed password for invalid user admin from 185.220.101.216 port 5014 ssh2
Aug  8 22:25:48 ns382633 sshd\[29855\]: Invalid user admin from 185.220.101.216 port 28390
Aug  8 22:25:48 ns382633 sshd\[29855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.216
2020-08-09 06:56:31

Recently Reported IPs

221.71.115.188 218.178.53.147 28.89.190.250 45.139.140.160
72.105.221.159 43.232.118.115 253.128.158.233 207.33.85.152
66.183.252.137 223.94.128.77 174.245.2.48 128.43.128.224
207.184.193.73 83.248.163.219 65.103.231.109 151.167.237.27
137.226.188.12 198.99.53.180 191.210.214.172 156.53.83.42