Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Carvide

Region: Leiria

Country: Portugal

Internet Service Provider: MEO

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.83.50.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.83.50.138.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092502 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 26 08:37:47 CST 2020
;; MSG SIZE  rcvd: 115
Host info
138.50.83.2.in-addr.arpa domain name pointer bl22-50-138.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.50.83.2.in-addr.arpa	name = bl22-50-138.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.99.63.181 attackbots
banned on SSHD
2020-03-30 17:39:25
139.199.183.185 attackspam
banned on SSHD
2020-03-30 17:51:02
14.166.51.205 attackbotsspam
Mar 30 05:51:43 localhost sshd[12823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.166.51.205  user=root
Mar 30 05:51:45 localhost sshd[12823]: Failed password for root from 14.166.51.205 port 52650 ssh2
...
2020-03-30 17:21:16
23.129.64.197 attackbots
Invalid user pi from 23.129.64.197 port 47822
2020-03-30 18:00:32
106.124.131.214 attack
$f2bV_matches
2020-03-30 17:30:12
5.39.82.197 attack
Invalid user caltech from 5.39.82.197 port 60922
2020-03-30 17:17:15
83.97.20.33 attack
W 31101,/var/log/nginx/access.log,-,-
2020-03-30 17:15:17
152.136.153.17 attack
Mar 29 23:46:28 ny01 sshd[26965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.153.17
Mar 29 23:46:30 ny01 sshd[26965]: Failed password for invalid user ykr from 152.136.153.17 port 52438 ssh2
Mar 29 23:51:38 ny01 sshd[29176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.153.17
2020-03-30 17:27:58
128.199.248.200 attackspambots
128.199.248.200 - - [30/Mar/2020:05:51:24 +0200] "GET /wp-login.php HTTP/1.1" 200 6136 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.248.200 - - [30/Mar/2020:05:51:27 +0200] "POST /wp-login.php HTTP/1.1" 200 7014 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.248.200 - - [30/Mar/2020:05:51:32 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-30 17:32:35
140.143.134.86 attackspam
k+ssh-bruteforce
2020-03-30 17:43:10
1.20.217.151 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-30 17:42:40
51.178.55.87 attackspam
Mar 30 06:48:11 vps sshd[29956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.55.87 
Mar 30 06:48:13 vps sshd[29956]: Failed password for invalid user libuuid from 51.178.55.87 port 35174 ssh2
Mar 30 06:58:16 vps sshd[30365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.55.87 
...
2020-03-30 17:23:06
195.122.226.164 attackbots
banned on SSHD
2020-03-30 17:35:22
35.197.133.238 attackspam
2020-03-30T07:33:44.644236randservbullet-proofcloud-66.localdomain sshd[13467]: Invalid user mysql from 35.197.133.238 port 55308
2020-03-30T07:33:44.647744randservbullet-proofcloud-66.localdomain sshd[13467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=238.133.197.35.bc.googleusercontent.com
2020-03-30T07:33:44.644236randservbullet-proofcloud-66.localdomain sshd[13467]: Invalid user mysql from 35.197.133.238 port 55308
2020-03-30T07:33:51.169280randservbullet-proofcloud-66.localdomain sshd[13467]: Failed password for invalid user mysql from 35.197.133.238 port 55308 ssh2
...
2020-03-30 17:31:32
222.186.30.187 attackbots
2020-03-29 UTC: (2x) - root(2x)
2020-03-30 17:57:20

Recently Reported IPs

63.91.151.228 88.189.103.131 108.244.252.113 109.91.188.167
41.177.126.127 46.6.4.207 109.250.13.195 116.129.98.148
94.1.96.1 90.94.86.1 86.20.234.135 208.58.101.197
27.81.1.81 189.231.29.97 153.1.72.190 81.229.71.97
187.138.133.200 131.193.80.200 31.201.179.16 86.179.254.169