Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.130.215.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35793
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;178.130.215.83.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091003 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Sep 11 10:17:24 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 83.215.130.178.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 83.215.130.178.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.105.157.226 attack
Sat, 20 Jul 2019 21:55:13 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:06:30
112.135.250.11 attackspam
Sat, 20 Jul 2019 21:55:08 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:20:13
189.124.82.24 attack
Sat, 20 Jul 2019 21:55:06 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:21:41
64.91.235.8 attackspambots
\[2019-07-21 04:44:02\] NOTICE\[2943\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '"1003" \' failed for '64.91.235.8:5273' \(callid: 4249558358\) - Failed to authenticate
\[2019-07-21 04:44:02\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-21T04:44:02.424+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="4249558358",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/64.91.235.8/5273",Challenge="1563677042/04a101cd58781307d35f3d5794b52098",Response="15744d74dd9d0147fc7bc63e8bb68f33",ExpectedResponse=""
\[2019-07-21 04:44:02\] NOTICE\[28964\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '"1003" \' failed for '64.91.235.8:5273' \(callid: 2887640393\) - No matching endpoint found after 5 tries in 0.424 ms
\[2019-07-21 04:44:02\] SECURITY\[1715\] res_security_log.c: SecurityEvent="InvalidAccountID",EventTV="2019-07-21T04:44
2019-07-21 11:24:50
36.68.7.24 attackspam
Sat, 20 Jul 2019 21:55:03 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:38:29
178.128.3.152 attackbots
Jul 21 02:32:09 *** sshd[737]: Invalid user nagios from 178.128.3.152
2019-07-21 11:17:18
185.143.221.59 attackbots
Jul 20 23:55:16 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.221.59 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=60371 PROTO=TCP SPT=59291 DPT=8904 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-21 10:55:28
61.223.128.131 attackspambots
Sat, 20 Jul 2019 21:55:09 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:17:38
201.43.234.7 attackbotsspam
Sat, 20 Jul 2019 21:55:02 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:39:25
181.199.39.48 attackspam
Sat, 20 Jul 2019 21:55:03 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:32:44
185.238.29.12 attackbotsspam
WordPress wp-login brute force :: 185.238.29.12 0.164 BYPASS [21/Jul/2019:07:55:18  1000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 4214 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-21 10:51:40
176.108.100.96 attack
Sat, 20 Jul 2019 21:55:07 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:22:04
102.129.73.85 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 20:43:47,002 INFO [amun_request_handler] PortScan Detected on Port: 445 (102.129.73.85)
2019-07-21 11:28:00
123.201.226.204 attackbotsspam
Sat, 20 Jul 2019 21:55:05 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:27:35
82.254.212.11 attackspambots
Jul 21 05:20:37 [munged] sshd[32138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.254.212.11
2019-07-21 11:33:54

Recently Reported IPs

204.168.175.146 116.116.88.127 224.75.159.243 158.36.4.188
67.77.125.129 85.9.28.168 249.184.202.41 95.53.192.44
201.169.60.191 155.167.212.223 118.169.81.197 167.114.21.253
116.203.182.136 142.252.248.13 37.114.137.120 36.75.142.48
157.85.39.89 152.115.21.101 51.39.94.185 118.169.80.240