Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.242.214.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;133.242.214.83.			IN	A

;; AUTHORITY SECTION:
.			263	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 09:40:56 CST 2023
;; MSG SIZE  rcvd: 107
Host info
83.214.242.133.in-addr.arpa domain name pointer rs-sakaecho.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.214.242.133.in-addr.arpa	name = rs-sakaecho.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.243.130.25 attackbots
Port Scan: Events[1] countPorts[1]: 139 ..
2020-04-16 07:54:15
87.251.74.250 attackspambots
Multiport scan : 35 ports scanned 60 123 300 303 404 443 444 500 505 909 999 1010 1234 2002 3333 3344 3385 3386 3390 3399 4321 5566 6060 6655 6677 7000 17000 23000 33383 33389 33398 33899 40000 60000 63389
2020-04-16 07:45:51
192.241.237.107 attack
Port Scan: Events[2] countPorts[2]: 873 102 ..
2020-04-16 08:01:11
106.13.181.147 attackspambots
Invalid user j from 106.13.181.147 port 40748
2020-04-16 07:58:35
209.17.96.178 attack
Port Scan: Events[3] countPorts[3]: 80 8443 137 ..
2020-04-16 07:28:34
60.216.19.58 attack
2020-04-15T17:06:08.681732linuxbox-skyline sshd[157513]: Invalid user sandy from 60.216.19.58 port 47952
...
2020-04-16 07:59:06
52.232.199.165 attackspambots
Brute forcing email accounts
2020-04-16 07:59:31
222.154.86.51 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-04-16 08:00:27
218.58.227.229 attackbotsspam
" "
2020-04-16 07:57:23
193.108.44.122 attack
scan r
2020-04-16 07:38:39
192.241.239.229 attackbots
scans once in preceeding hours on the ports (in chronological order) 1527 resulting in total of 25 scans from 192.241.128.0/17 block.
2020-04-16 07:51:20
178.154.200.236 attackbotsspam
[Thu Apr 16 03:22:56.745943 2020] [:error] [pid 24760:tid 140327109256960] [client 178.154.200.236:59134] [client 178.154.200.236] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XpdtIHS04Y-SU4QLsUrOxgAAATw"]
...
2020-04-16 07:47:23
138.197.32.150 attack
Invalid user pzserver from 138.197.32.150 port 38738
2020-04-16 07:29:08
112.85.42.174 attackbots
2020-04-16T01:32:34.885115vps751288.ovh.net sshd\[20821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
2020-04-16T01:32:37.371995vps751288.ovh.net sshd\[20821\]: Failed password for root from 112.85.42.174 port 51605 ssh2
2020-04-16T01:32:41.090965vps751288.ovh.net sshd\[20821\]: Failed password for root from 112.85.42.174 port 51605 ssh2
2020-04-16T01:32:44.022536vps751288.ovh.net sshd\[20821\]: Failed password for root from 112.85.42.174 port 51605 ssh2
2020-04-16T01:32:47.365652vps751288.ovh.net sshd\[20821\]: Failed password for root from 112.85.42.174 port 51605 ssh2
2020-04-16 07:39:53
95.85.60.251 attackspam
SSH bruteforce
2020-04-16 07:58:47

Recently Reported IPs

103.217.240.160 82.86.112.153 203.183.134.160 23.154.62.189
175.248.63.230 189.50.181.42 163.205.198.67 100.77.164.122
83.169.19.179 192.20.0.35 51.8.64.172 78.212.142.88
157.105.39.247 234.240.226.137 241.226.62.144 175.234.7.175
94.141.140.192 74.255.102.231 124.110.187.165 94.123.188.232