Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ethiopia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
213.55.83.49 attack
Unauthorized connection attempt from IP address 213.55.83.49 on Port 445(SMB)
2020-05-16 21:25:35
213.55.83.130 attackbotsspam
1588111834 - 04/29/2020 00:10:34 Host: 213.55.83.130/213.55.83.130 Port: 445 TCP Blocked
2020-04-29 07:27:29
213.55.83.51 attackspambots
Icarus honeypot on github
2020-04-27 08:28:44
213.55.83.154 attackspam
20/4/10@08:06:21: FAIL: Alarm-Network address from=213.55.83.154
...
2020-04-11 01:54:54
213.55.83.51 attack
DATE:2020-02-02 16:09:36, IP:213.55.83.51, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-02 23:34:55
213.55.83.124 attackspam
Unauthorized connection attempt detected from IP address 213.55.83.124 to port 445
2020-01-06 01:11:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.55.83.211
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.55.83.211.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020500 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 02:28:01 CST 2020
;; MSG SIZE  rcvd: 117
Host info
211.83.55.213.in-addr.arpa domain name pointer mail.stmaryuniversitycollege.edu.et.
211.83.55.213.in-addr.arpa domain name pointer mail.stmarycollege.edu.et.
211.83.55.213.in-addr.arpa domain name pointer mail.smuc.edu.et.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
211.83.55.213.in-addr.arpa	name = mail.smuc.edu.et.
211.83.55.213.in-addr.arpa	name = mail.stmaryuniversitycollege.edu.et.
211.83.55.213.in-addr.arpa	name = mail.stmarycollege.edu.et.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.25.52.201 attackspambots
1585831194 - 04/02/2020 14:39:54 Host: 123.25.52.201/123.25.52.201 Port: 445 TCP Blocked
2020-04-03 04:55:27
194.106.244.61 attackspambots
(mod_security) mod_security (id:350202) triggered by 194.106.244.61 (AT/Austria/-): 10 in the last 3600 secs
2020-04-03 05:02:19
128.199.204.164 attackbotsspam
Apr  2 18:49:59 ns382633 sshd\[22250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
Apr  2 18:50:01 ns382633 sshd\[22250\]: Failed password for root from 128.199.204.164 port 34314 ssh2
Apr  2 19:02:52 ns382633 sshd\[24866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
Apr  2 19:02:55 ns382633 sshd\[24866\]: Failed password for root from 128.199.204.164 port 47562 ssh2
Apr  2 19:10:22 ns382633 sshd\[26673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
2020-04-03 04:56:21
51.255.132.213 attack
Apr  2 22:39:49 meumeu sshd[7967]: Failed password for root from 51.255.132.213 port 51548 ssh2
Apr  2 22:44:25 meumeu sshd[8899]: Failed password for root from 51.255.132.213 port 35476 ssh2
...
2020-04-03 04:52:30
1.203.115.141 attack
Invalid user ss1afldl from 1.203.115.141 port 53498
2020-04-03 04:39:06
180.182.245.91 attackspambots
firewall-block, port(s): 8080/tcp
2020-04-03 04:37:44
118.70.116.154 attackbots
firewall-block, port(s): 445/tcp
2020-04-03 04:46:59
88.88.25.14 attack
fail2ban
2020-04-03 05:14:39
137.74.119.50 attackbots
Invalid user test from 137.74.119.50 port 37124
2020-04-03 04:38:46
196.152.79.83 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 02-04-2020 13:40:12.
2020-04-03 04:40:50
111.252.234.169 attack
Unauthorized connection attempt from IP address 111.252.234.169 on Port 445(SMB)
2020-04-03 04:44:19
51.83.41.120 attackbotsspam
Invalid user fenix from 51.83.41.120 port 41820
2020-04-03 04:47:48
151.253.165.70 attack
Automatic report - XMLRPC Attack
2020-04-03 05:12:02
109.124.65.86 attack
Invalid user user from 109.124.65.86 port 44217
2020-04-03 05:04:36
71.6.233.27 attack
firewall-block, port(s): 990/tcp
2020-04-03 04:52:13

Recently Reported IPs

1.52.191.4 196.1.220.162 195.9.105.34 141.212.123.199
124.105.173.17 36.65.60.201 219.91.196.210 36.82.100.251
2.89.183.131 194.187.251.115 182.253.253.31 101.96.120.177
123.126.82.7 14.191.68.94 118.201.195.226 119.92.251.105
113.187.177.250 140.238.163.130 120.131.3.89 166.223.21.148