Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.83.211.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.83.211.29.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092601 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 03:12:47 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 29.211.83.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.211.83.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
159.203.201.46 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-30 13:18:08
217.182.206.141 attack
$f2bV_matches
2019-10-30 13:23:18
218.4.169.82 attack
2019-10-30T05:30:51.354539abusebot-7.cloudsearch.cf sshd\[13542\]: Invalid user cd3vf4bg5 from 218.4.169.82 port 36142
2019-10-30 13:45:39
58.240.218.198 attackspambots
Oct 30 05:57:56 tux-35-217 sshd\[13489\]: Invalid user biology from 58.240.218.198 port 56910
Oct 30 05:57:56 tux-35-217 sshd\[13489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.218.198
Oct 30 05:57:58 tux-35-217 sshd\[13489\]: Failed password for invalid user biology from 58.240.218.198 port 56910 ssh2
Oct 30 06:01:44 tux-35-217 sshd\[13520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.240.218.198  user=root
...
2019-10-30 13:41:23
220.130.222.156 attack
Oct 29 18:26:56 web1 sshd\[24698\]: Invalid user josefina from 220.130.222.156
Oct 29 18:26:56 web1 sshd\[24698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.222.156
Oct 29 18:26:58 web1 sshd\[24698\]: Failed password for invalid user josefina from 220.130.222.156 port 39766 ssh2
Oct 29 18:31:20 web1 sshd\[25146\]: Invalid user rumeno from 220.130.222.156
Oct 29 18:31:20 web1 sshd\[25146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.222.156
2019-10-30 13:18:51
129.211.130.37 attackbotsspam
Oct 30 05:57:15 ns41 sshd[25329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.37
2019-10-30 13:06:36
178.128.217.135 attack
2019-10-30T04:59:09.009169hub.schaetter.us sshd\[19330\]: Invalid user rockit from 178.128.217.135 port 38486
2019-10-30T04:59:09.019984hub.schaetter.us sshd\[19330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135
2019-10-30T04:59:11.191297hub.schaetter.us sshd\[19330\]: Failed password for invalid user rockit from 178.128.217.135 port 38486 ssh2
2019-10-30T05:03:24.390647hub.schaetter.us sshd\[19357\]: Invalid user deazia from 178.128.217.135 port 47606
2019-10-30T05:03:24.408929hub.schaetter.us sshd\[19357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.135
...
2019-10-30 13:04:28
138.68.20.158 attack
Oct 30 04:55:26 MK-Soft-VM7 sshd[2100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.20.158 
Oct 30 04:55:28 MK-Soft-VM7 sshd[2100]: Failed password for invalid user ethos from 138.68.20.158 port 41956 ssh2
...
2019-10-30 13:05:40
107.155.49.126 attackbots
Oct 30 04:55:17 rotator sshd\[17420\]: Invalid user jenkins from 107.155.49.126Oct 30 04:55:18 rotator sshd\[17420\]: Failed password for invalid user jenkins from 107.155.49.126 port 32934 ssh2Oct 30 04:55:21 rotator sshd\[17420\]: Failed password for invalid user jenkins from 107.155.49.126 port 32934 ssh2Oct 30 04:55:24 rotator sshd\[17420\]: Failed password for invalid user jenkins from 107.155.49.126 port 32934 ssh2Oct 30 04:55:26 rotator sshd\[17420\]: Failed password for invalid user jenkins from 107.155.49.126 port 32934 ssh2Oct 30 04:55:28 rotator sshd\[17420\]: Failed password for invalid user jenkins from 107.155.49.126 port 32934 ssh2
...
2019-10-30 13:06:04
54.180.139.105 attack
10/30/2019-01:20:52.983261 54.180.139.105 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-30 13:22:27
89.248.174.222 attackspambots
10/30/2019-00:59:14.261736 89.248.174.222 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-30 13:20:22
157.55.39.180 attackbots
Automatic report - Banned IP Access
2019-10-30 13:43:08
62.234.180.200 attack
Oct 30 04:51:15 vps01 sshd[16926]: Failed password for root from 62.234.180.200 port 34856 ssh2
2019-10-30 13:05:01
223.171.32.55 attackbotsspam
Oct 30 06:14:21 meumeu sshd[3348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 
Oct 30 06:14:23 meumeu sshd[3348]: Failed password for invalid user 123456 from 223.171.32.55 port 5128 ssh2
Oct 30 06:18:50 meumeu sshd[4230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.171.32.55 
...
2019-10-30 13:48:53
106.52.176.91 attackbots
Oct 30 04:43:34 venus sshd\[13806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.176.91  user=root
Oct 30 04:43:37 venus sshd\[13806\]: Failed password for root from 106.52.176.91 port 35002 ssh2
Oct 30 04:48:39 venus sshd\[13932\]: Invalid user ubnt from 106.52.176.91 port 44600
...
2019-10-30 13:15:35

Recently Reported IPs

125.22.173.161 89.211.140.76 207.215.249.130 162.229.15.161
103.81.171.230 68.24.26.182 184.236.44.66 211.87.67.135
201.245.200.122 163.209.48.37 73.91.40.171 88.238.250.154
59.99.8.60 219.38.136.194 200.69.243.55 213.249.123.129
158.36.117.240 121.148.237.229 139.193.59.200 191.63.91.193