Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.138.96.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.138.96.83.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032801 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 29 02:49:26 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 83.96.138.217.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 83.96.138.217.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.97.246.253 attackbotsspam
failed_logins
2019-08-09 22:59:20
54.37.151.239 attack
leo_www
2019-08-09 23:40:56
216.244.66.203 attack
Automatic report - Banned IP Access
2019-08-09 23:48:16
196.52.43.99 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-09 23:10:37
31.210.75.246 attack
xmlrpc attack
2019-08-09 23:48:55
187.189.109.138 attack
2019-08-09T07:57:26.864513abusebot-2.cloudsearch.cf sshd\[21720\]: Invalid user agustin from 187.189.109.138 port 35566
2019-08-09 23:51:21
23.129.64.181 attackspambots
Aug  9 14:18:27 MK-Soft-Root2 sshd\[18051\]: Invalid user debian from 23.129.64.181 port 62741
Aug  9 14:18:27 MK-Soft-Root2 sshd\[18051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.181
Aug  9 14:18:29 MK-Soft-Root2 sshd\[18051\]: Failed password for invalid user debian from 23.129.64.181 port 62741 ssh2
...
2019-08-09 23:28:25
192.210.56.146 attackspam
xmlrpc attack
2019-08-09 22:32:28
2001:41d0:302:1000::8523 attackbotsspam
xmlrpc attack
2019-08-09 23:16:56
94.230.208.148 attackspambots
LGS,WP GET /wp-login.php
2019-08-09 23:11:24
80.222.121.225 attackbotsspam
Aug  9 09:55:01 www2 sshd\[50290\]: Invalid user taivassalofi from 80.222.121.225Aug  9 09:55:03 www2 sshd\[50290\]: Failed password for invalid user taivassalofi from 80.222.121.225 port 57939 ssh2Aug  9 09:55:13 www2 sshd\[50552\]: Invalid user taivassalofi from 80.222.121.225
...
2019-08-09 22:45:23
46.182.106.190 attackbots
Triggered by Fail2Ban at Vostok web server
2019-08-09 23:11:45
200.199.6.204 attackbotsspam
Aug  9 15:07:08 mail sshd\[24000\]: Failed password for root from 200.199.6.204 port 45460 ssh2
Aug  9 15:24:21 mail sshd\[24218\]: Invalid user rpm from 200.199.6.204 port 37712
...
2019-08-09 23:34:33
185.32.188.19 attack
xmlrpc attack
2019-08-09 23:38:23
67.207.94.17 attack
Aug  9 06:52:24 cac1d2 sshd\[31705\]: Invalid user oscar from 67.207.94.17 port 46399
Aug  9 06:52:24 cac1d2 sshd\[31705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.94.17
Aug  9 06:52:27 cac1d2 sshd\[31705\]: Failed password for invalid user oscar from 67.207.94.17 port 46399 ssh2
...
2019-08-09 22:48:36

Recently Reported IPs

97.31.3.125 165.39.240.23 87.193.203.85 243.226.131.78
32.149.49.251 15.136.82.58 165.159.19.113 192.96.84.245
60.167.108.219 3.45.7.136 246.213.244.128 171.214.232.160
48.165.16.196 226.131.181.157 156.216.77.217 174.40.85.125
13.27.156.69 12.63.146.97 215.163.20.132 90.133.8.25