Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.13.211.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.13.211.217.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:12:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
217.211.13.83.in-addr.arpa domain name pointer fid217.internetdsl.tpnet.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.211.13.83.in-addr.arpa	name = fid217.internetdsl.tpnet.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.188.140.2 attack
Dec  2 14:31:09 nginx sshd[65463]: Invalid user pi from 14.188.140.2
Dec  2 14:31:10 nginx sshd[65463]: Connection closed by 14.188.140.2 port 54761 [preauth]
2019-12-03 03:44:13
78.234.142.90 attack
Dec  2 16:29:32 venus sshd\[23779\]: Invalid user admin from 78.234.142.90 port 42850
Dec  2 16:29:33 venus sshd\[23779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.234.142.90
Dec  2 16:29:35 venus sshd\[23779\]: Failed password for invalid user admin from 78.234.142.90 port 42850 ssh2
...
2019-12-03 03:40:12
46.101.72.145 attack
$f2bV_matches
2019-12-03 03:46:15
180.248.87.228 attack
Unauthorized connection attempt from IP address 180.248.87.228 on Port 445(SMB)
2019-12-03 03:58:12
208.81.226.219 attackspam
Automatic report - XMLRPC Attack
2019-12-03 03:45:24
45.23.108.9 attackbotsspam
fail2ban
2019-12-03 03:43:40
222.120.192.114 attackbotsspam
Automatic report - Banned IP Access
2019-12-03 04:12:45
5.235.40.156 attack
Unauthorized connection attempt from IP address 5.235.40.156 on Port 445(SMB)
2019-12-03 03:49:29
180.113.68.234 attack
FTP brute-force attack
2019-12-03 03:52:48
117.240.77.50 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-03 03:45:45
41.139.164.149 attackspambots
SpamReport
2019-12-03 03:56:31
170.210.214.50 attackbotsspam
leo_www
2019-12-03 03:53:37
202.106.93.46 attackspambots
Dec  2 14:50:04 mail sshd\[27987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46  user=backup
Dec  2 14:50:06 mail sshd\[27987\]: Failed password for backup from 202.106.93.46 port 56779 ssh2
Dec  2 14:58:07 mail sshd\[28660\]: Invalid user odendahl from 202.106.93.46
Dec  2 14:58:07 mail sshd\[28660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
...
2019-12-03 03:50:49
203.81.69.11 attackspam
SpamReport
2019-12-03 04:02:44
186.95.50.29 attack
Unauthorized connection attempt from IP address 186.95.50.29 on Port 445(SMB)
2019-12-03 04:03:01

Recently Reported IPs

214.70.111.215 245.243.61.80 216.230.189.243 124.115.137.111
212.41.88.232 188.8.116.129 194.87.3.69 194.255.18.25
188.227.154.30 205.33.231.226 18.49.185.57 122.213.10.79
164.179.47.77 210.213.32.57 168.61.194.32 252.182.232.82
172.10.123.219 22.159.238.19 60.58.19.96 9.160.24.111