Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.117.139.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20723
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.117.139.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 20:54:58 CST 2024
;; MSG SIZE  rcvd: 107
Host info
b'Host 83.139.117.214.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.139.117.214.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
81.91.138.75 attackspambots
Fail2Ban Ban Triggered
2019-12-09 01:40:15
5.135.94.191 attackspam
Dec  8 19:21:47 server sshd\[24667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu  user=uucp
Dec  8 19:21:49 server sshd\[24667\]: Failed password for uucp from 5.135.94.191 port 60700 ssh2
Dec  8 19:30:07 server sshd\[26901\]: Invalid user jema from 5.135.94.191
Dec  8 19:30:07 server sshd\[26901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-5-135-94.eu 
Dec  8 19:30:09 server sshd\[26901\]: Failed password for invalid user jema from 5.135.94.191 port 53414 ssh2
...
2019-12-09 01:36:22
39.118.39.170 attackspambots
Dec  8 06:09:47 web1 sshd\[17218\]: Invalid user yz from 39.118.39.170
Dec  8 06:09:47 web1 sshd\[17218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.118.39.170
Dec  8 06:09:48 web1 sshd\[17218\]: Failed password for invalid user yz from 39.118.39.170 port 56714 ssh2
Dec  8 06:16:33 web1 sshd\[17984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.118.39.170  user=root
Dec  8 06:16:35 web1 sshd\[17984\]: Failed password for root from 39.118.39.170 port 39310 ssh2
2019-12-09 02:11:11
51.68.115.235 attackspambots
Dec  8 17:21:02 IngegnereFirenze sshd[21524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.115.235  user=root
Dec  8 17:21:02 IngegnereFirenze sshd[21524]: User root from 51.68.115.235 not allowed because not listed in AllowUsers
Dec  8 17:21:04 IngegnereFirenze sshd[21524]: Failed password for invalid user root from 51.68.115.235 port 39223 ssh2
...
2019-12-09 01:46:31
92.53.69.6 attack
Dec  8 17:38:21 game-panel sshd[32427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6
Dec  8 17:38:23 game-panel sshd[32427]: Failed password for invalid user guest from 92.53.69.6 port 41764 ssh2
Dec  8 17:44:48 game-panel sshd[304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.53.69.6
2019-12-09 01:50:51
47.56.168.37 attack
Unauthorized connection attempt detected from IP address 47.56.168.37 to port 445
2019-12-09 01:58:03
106.12.8.249 attackbots
Dec  8 18:03:22 MK-Soft-Root1 sshd[29287]: Failed password for root from 106.12.8.249 port 48552 ssh2
Dec  8 18:09:53 MK-Soft-Root1 sshd[30649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.8.249 
...
2019-12-09 01:50:39
202.131.242.74 attackbotsspam
Unauthorized connection attempt detected from IP address 202.131.242.74 to port 445
2019-12-09 01:49:46
52.247.223.210 attackspam
Dec  8 07:44:24 web1 sshd\[27971\]: Invalid user gassert from 52.247.223.210
Dec  8 07:44:24 web1 sshd\[27971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.223.210
Dec  8 07:44:26 web1 sshd\[27971\]: Failed password for invalid user gassert from 52.247.223.210 port 60202 ssh2
Dec  8 07:50:48 web1 sshd\[28657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.247.223.210  user=backup
Dec  8 07:50:50 web1 sshd\[28657\]: Failed password for backup from 52.247.223.210 port 42972 ssh2
2019-12-09 01:54:20
103.221.252.46 attackspambots
Dec  8 12:59:23 linuxvps sshd\[7008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46  user=root
Dec  8 12:59:26 linuxvps sshd\[7008\]: Failed password for root from 103.221.252.46 port 53540 ssh2
Dec  8 13:06:52 linuxvps sshd\[12152\]: Invalid user gunhild from 103.221.252.46
Dec  8 13:06:52 linuxvps sshd\[12152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Dec  8 13:06:55 linuxvps sshd\[12152\]: Failed password for invalid user gunhild from 103.221.252.46 port 34556 ssh2
2019-12-09 02:14:03
185.143.223.104 attackbotsspam
2019-12-08T18:26:43.995781+01:00 lumpi kernel: [1115952.618474] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.104 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=31241 PROTO=TCP SPT=41622 DPT=9991 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-09 01:44:18
148.70.159.181 attackspam
Dec  8 19:59:23 sauna sshd[25285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.159.181
Dec  8 19:59:26 sauna sshd[25285]: Failed password for invalid user wigand from 148.70.159.181 port 40252 ssh2
...
2019-12-09 02:08:22
113.53.202.146 attackbots
Unauthorised access (Dec  8) SRC=113.53.202.146 LEN=48 TTL=116 ID=27066 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-09 02:06:55
219.139.158.116 attackbots
Unauthorised access (Dec  8) SRC=219.139.158.116 LEN=40 TTL=242 ID=34934 TCP DPT=1433 WINDOW=1024 SYN
2019-12-09 01:36:58
139.217.96.74 attackspam
Dec  8 18:27:02 sd-53420 sshd\[11708\]: Invalid user teamspeak3 from 139.217.96.74
Dec  8 18:27:02 sd-53420 sshd\[11708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.74
Dec  8 18:27:03 sd-53420 sshd\[11708\]: Failed password for invalid user teamspeak3 from 139.217.96.74 port 33668 ssh2
Dec  8 18:27:57 sd-53420 sshd\[11860\]: Invalid user teamspeak3 from 139.217.96.74
Dec  8 18:27:57 sd-53420 sshd\[11860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.96.74
...
2019-12-09 01:59:14

Recently Reported IPs

247.95.41.15 189.61.107.34 164.2.163.71 170.180.152.237
219.81.79.28 120.7.165.178 230.252.136.77 136.19.178.27
132.219.123.1 152.73.97.129 4.57.123.5 253.17.219.197
221.76.136.147 253.117.141.203 4.21.67.251 228.70.170.118
166.63.241.216 167.249.116.33 44.162.248.241 6.128.24.166