Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mumbai

Region: Maharashtra

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.202.83.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.202.83.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:51:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.83.202.13.in-addr.arpa domain name pointer ec2-13-202-83-80.ap-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.83.202.13.in-addr.arpa	name = ec2-13-202-83-80.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
198.199.73.239 attackbotsspam
May  2 19:53:38 markkoudstaal sshd[15944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.73.239
May  2 19:53:40 markkoudstaal sshd[15944]: Failed password for invalid user bobo from 198.199.73.239 port 57050 ssh2
May  2 19:58:23 markkoudstaal sshd[16824]: Failed password for root from 198.199.73.239 port 34899 ssh2
2020-05-03 02:14:39
79.137.74.57 attack
May  2 19:22:50 MainVPS sshd[9596]: Invalid user cp from 79.137.74.57 port 54355
May  2 19:22:50 MainVPS sshd[9596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.74.57
May  2 19:22:50 MainVPS sshd[9596]: Invalid user cp from 79.137.74.57 port 54355
May  2 19:22:52 MainVPS sshd[9596]: Failed password for invalid user cp from 79.137.74.57 port 54355 ssh2
May  2 19:27:59 MainVPS sshd[13853]: Invalid user deploy from 79.137.74.57 port 60190
...
2020-05-03 02:08:56
92.118.206.182 attack
Brute force SMTP login attempted.
...
2020-05-03 01:52:33
85.116.154.241 attack
SSH Bruteforce attempt
2020-05-03 02:07:05
222.252.25.186 attack
20 attempts against mh-ssh on cloud
2020-05-03 02:12:22
217.9.154.65 attackbotsspam
445/tcp
[2020-05-02]1pkt
2020-05-03 01:40:00
81.91.177.66 attackbotsspam
May  2 18:47:37 [host] kernel: [5066964.520143] [U
May  2 18:47:43 [host] kernel: [5066970.684873] [U
May  2 18:48:06 [host] kernel: [5066993.636745] [U
May  2 18:48:19 [host] kernel: [5067007.193095] [U
May  2 18:48:41 [host] kernel: [5067028.748173] [U
May  2 18:49:11 [host] kernel: [5067058.627859] [U
2020-05-03 02:06:31
152.136.119.164 attackspam
May  2 14:17:23 roki-contabo sshd\[22239\]: Invalid user incoming from 152.136.119.164
May  2 14:17:23 roki-contabo sshd\[22239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.119.164
May  2 14:17:26 roki-contabo sshd\[22239\]: Failed password for invalid user incoming from 152.136.119.164 port 36380 ssh2
May  2 14:26:15 roki-contabo sshd\[22392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.119.164  user=root
May  2 14:26:17 roki-contabo sshd\[22392\]: Failed password for root from 152.136.119.164 port 36614 ssh2
...
2020-05-03 02:17:50
190.123.208.31 attack
Automatic report - Banned IP Access
2020-05-03 02:14:59
106.246.250.202 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-05-03 02:14:24
54.218.122.162 attackbots
May  2 17:29:27 server sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.218.122.162
May  2 17:29:28 server sshd[2459]: Failed password for invalid user tiina from 54.218.122.162 port 50312 ssh2
May  2 17:32:33 server sshd[2720]: Failed password for root from 54.218.122.162 port 54936 ssh2
...
2020-05-03 02:01:41
122.51.254.9 attackbotsspam
May  2 14:40:25 home sshd[23546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.9
May  2 14:40:27 home sshd[23546]: Failed password for invalid user andrei from 122.51.254.9 port 45870 ssh2
May  2 14:45:41 home sshd[24343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.9
...
2020-05-03 01:37:30
183.88.243.169 attackbots
Brute force attempt
2020-05-03 02:03:18
213.32.78.219 attackbotsspam
May 02 10:12:08 askasleikir sshd[17977]: Failed password for invalid user asm from 213.32.78.219 port 56136 ssh2
May 02 09:54:41 askasleikir sshd[17928]: Failed password for invalid user ubuntu from 213.32.78.219 port 38454 ssh2
May 02 10:04:54 askasleikir sshd[17960]: Failed password for invalid user testing from 213.32.78.219 port 36870 ssh2
2020-05-03 01:39:10
54.37.9.10 attackspam
May  3 01:01:07 localhost sshd[1738508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.9.10  user=root
May  3 01:01:09 localhost sshd[1738508]: Failed password for root from 54.37.9.10 port 52006 ssh2
...
2020-05-03 02:16:55

Recently Reported IPs

51.82.222.62 243.204.165.183 193.41.138.190 52.65.159.171
15.110.226.254 66.182.246.42 38.12.170.158 73.116.103.221
139.59.23.174 214.90.152.128 94.250.69.165 197.142.218.197
16.218.173.127 201.1.143.52 147.68.85.37 187.137.185.95
63.80.144.88 124.239.74.246 238.22.152.200 164.35.120.234