Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ethiopia

Internet Service Provider: Ethio Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Icarus honeypot on github
2020-04-27 08:28:44
attack
DATE:2020-02-02 16:09:36, IP:213.55.83.51, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-02 23:34:55
Comments on same subnet:
IP Type Details Datetime
213.55.83.49 attack
Unauthorized connection attempt from IP address 213.55.83.49 on Port 445(SMB)
2020-05-16 21:25:35
213.55.83.130 attackbotsspam
1588111834 - 04/29/2020 00:10:34 Host: 213.55.83.130/213.55.83.130 Port: 445 TCP Blocked
2020-04-29 07:27:29
213.55.83.154 attackspam
20/4/10@08:06:21: FAIL: Alarm-Network address from=213.55.83.154
...
2020-04-11 01:54:54
213.55.83.124 attackspam
Unauthorized connection attempt detected from IP address 213.55.83.124 to port 445
2020-01-06 01:11:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.55.83.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.55.83.51.			IN	A

;; AUTHORITY SECTION:
.			139	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020200 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 23:34:42 CST 2020
;; MSG SIZE  rcvd: 116
Host info
51.83.55.213.in-addr.arpa domain name pointer mail.ecsc.edu.et.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.83.55.213.in-addr.arpa	name = mail.ecsc.edu.et.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
60.170.103.131 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-01-09 00:34:03
45.134.179.20 attack
firewall-block, port(s): 1107/tcp, 6004/tcp, 6669/tcp, 7999/tcp
2020-01-09 00:16:15
49.70.233.132 attack
Unauthorized connection attempt detected from IP address 49.70.233.132 to port 2323 [T]
2020-01-09 00:15:09
196.216.14.78 attackspam
Unauthorized connection attempt detected from IP address 196.216.14.78 to port 8080 [T]
2020-01-09 00:22:26
60.170.224.187 attackbotsspam
Unauthorized connection attempt detected from IP address 60.170.224.187 to port 23 [T]
2020-01-09 00:33:47
223.100.67.168 attackbots
Unauthorized connection attempt detected from IP address 223.100.67.168 to port 23 [T]
2020-01-09 00:20:32
122.225.18.194 attackspambots
Unauthorized connection attempt detected from IP address 122.225.18.194 to port 22 [T]
2020-01-09 00:07:26
42.112.161.17 attackspambots
Unauthorized connection attempt detected from IP address 42.112.161.17 to port 8080 [T]
2020-01-09 00:37:12
121.228.109.70 attack
Unauthorized connection attempt detected from IP address 121.228.109.70 to port 2223 [T]
2020-01-09 00:28:01
106.12.6.136 attack
Unauthorized connection attempt detected from IP address 106.12.6.136 to port 22 [T]
2020-01-09 00:31:54
101.251.68.232 attack
ssh failed login
2020-01-09 00:11:52
61.166.67.14 attackspam
Jan  8 16:42:27 server sshd\[17824\]: Invalid user pi from 61.166.67.14
Jan  8 16:42:27 server sshd\[17824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.166.67.14 
Jan  8 16:42:29 server sshd\[17828\]: Invalid user pi from 61.166.67.14
Jan  8 16:42:29 server sshd\[17824\]: Failed password for invalid user pi from 61.166.67.14 port 56812 ssh2
Jan  8 16:42:29 server sshd\[17828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.166.67.14 
...
2020-01-09 00:13:36
220.191.173.222 attackbotsspam
Unauthorized connection attempt detected from IP address 220.191.173.222 to port 13390 [T]
2020-01-09 00:21:00
49.51.160.47 attack
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 514 [T]
2020-01-09 00:34:30
185.251.219.92 attackbots
Unauthorized connection attempt detected from IP address 185.251.219.92 to port 23 [T]
2020-01-09 00:23:39

Recently Reported IPs

136.62.84.65 165.105.123.134 98.147.10.24 130.176.164.189
207.129.112.49 132.149.150.123 115.20.224.130 74.37.27.225
157.185.77.197 211.143.68.235 106.254.115.133 8.220.92.141
33.63.208.56 195.251.252.20 90.1.65.79 137.66.55.100
145.143.252.223 88.208.203.3 91.28.92.245 143.167.184.228