Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.139.83.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.139.83.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 08:18:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 6.83.139.219.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.83.139.219.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.38.144.202 attackspam
2020-01-19T06:33:44.477934server auth[1111576]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=haley rhost=46.38.144.202
2020-01-19T06:34:32.524419server auth[1111576]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=bss rhost=46.38.144.202
2020-01-19T06:35:20.434060server auth[1111576]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=tara rhost=46.38.144.202
...
2020-01-19 13:36:56
89.187.186.70 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-19 13:44:38
49.235.11.46 attack
Jan 19 12:59:19 webhost01 sshd[12840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.11.46
Jan 19 12:59:20 webhost01 sshd[12840]: Failed password for invalid user file from 49.235.11.46 port 48748 ssh2
...
2020-01-19 14:04:07
222.186.175.169 attackbotsspam
Jan 19 06:03:47 localhost sshd\[10954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.169  user=root
Jan 19 06:03:49 localhost sshd\[10954\]: Failed password for root from 222.186.175.169 port 41968 ssh2
Jan 19 06:03:52 localhost sshd\[10954\]: Failed password for root from 222.186.175.169 port 41968 ssh2
...
2020-01-19 14:05:34
157.245.58.40 attackbots
20 attempts against mh_ha-misbehave-ban on air.magehost.pro
2020-01-19 13:33:05
192.144.161.16 attack
Jan 19 01:57:33 firewall sshd[19031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.161.16
Jan 19 01:57:33 firewall sshd[19031]: Invalid user usertest from 192.144.161.16
Jan 19 01:57:36 firewall sshd[19031]: Failed password for invalid user usertest from 192.144.161.16 port 56498 ssh2
...
2020-01-19 13:39:43
46.229.168.132 attackspam
Automatic report - Banned IP Access
2020-01-19 14:01:52
222.109.50.27 attack
Unauthorized connection attempt detected from IP address 222.109.50.27 to port 2323 [J]
2020-01-19 13:34:24
93.105.58.83 attack
Automatic report - SSH Brute-Force Attack
2020-01-19 13:39:14
222.186.175.181 attackbotsspam
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
Failed password for root from 222.186.175.181 port 11473 ssh2
2020-01-19 14:01:39
201.93.47.132 attackbots
unauthorized connection attempt
2020-01-19 14:01:00
106.12.34.56 attack
Jan 19 06:27:44 dedicated sshd[14877]: Invalid user darwin from 106.12.34.56 port 40230
Jan 19 06:27:46 dedicated sshd[14877]: Failed password for invalid user darwin from 106.12.34.56 port 40230 ssh2
Jan 19 06:27:44 dedicated sshd[14877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.34.56 
Jan 19 06:27:44 dedicated sshd[14877]: Invalid user darwin from 106.12.34.56 port 40230
Jan 19 06:27:46 dedicated sshd[14877]: Failed password for invalid user darwin from 106.12.34.56 port 40230 ssh2
2020-01-19 13:40:02
119.129.119.63 attackspambots
Unauthorized connection attempt detected from IP address 119.129.119.63 to port 1433 [J]
2020-01-19 13:32:37
77.43.92.29 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-19 14:07:10
192.241.202.169 attackbotsspam
Jan 19 06:50:00 vps691689 sshd[28156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.202.169
Jan 19 06:50:01 vps691689 sshd[28156]: Failed password for invalid user daniel from 192.241.202.169 port 40396 ssh2
...
2020-01-19 13:53:27

Recently Reported IPs

52.61.185.187 64.54.215.222 16.70.6.125 216.157.125.36
97.122.138.184 241.196.114.100 28.192.28.164 82.244.55.138
238.91.223.97 206.216.96.85 13.165.169.61 23.21.199.236
28.191.127.246 138.33.254.167 57.242.66.72 242.109.120.25
216.153.55.245 167.116.175.214 29.223.38.205 99.168.167.240