Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.133.75.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41844
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.133.75.81.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 11:41:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 81.75.133.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.75.133.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.25.22.13 attackbotsspam
RDP brute force attack detected by fail2ban
2020-01-02 07:59:53
112.85.42.174 attackbotsspam
Jan  1 23:40:05 localhost sshd\[26755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan  1 23:40:06 localhost sshd\[26755\]: Failed password for root from 112.85.42.174 port 2564 ssh2
Jan  1 23:40:09 localhost sshd\[26755\]: Failed password for root from 112.85.42.174 port 2564 ssh2
...
2020-01-02 07:41:27
222.186.15.158 attackbotsspam
Jan  1 09:44:14 v26 sshd[28970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=r.r
Jan  1 09:44:16 v26 sshd[28970]: Failed password for r.r from 222.186.15.158 port 62098 ssh2
Jan  1 09:44:18 v26 sshd[28970]: Failed password for r.r from 222.186.15.158 port 62098 ssh2
Jan  1 09:44:20 v26 sshd[28970]: Failed password for r.r from 222.186.15.158 port 62098 ssh2
Jan  1 09:44:21 v26 sshd[28970]: Received disconnect from 222.186.15.158 port 62098:11:  [preauth]
Jan  1 09:44:21 v26 sshd[28970]: Disconnected from 222.186.15.158 port 62098 [preauth]
Jan  1 09:44:21 v26 sshd[28970]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=r.r
Jan  1 09:44:27 v26 sshd[28987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=r.r
Jan  1 09:44:29 v26 sshd[28987]: Failed password for r.r from 222.186.15.158 port 60427 ss........
-------------------------------
2020-01-02 08:12:39
96.44.186.50 attack
(imapd) Failed IMAP login from 96.44.186.50 (US/United States/96.44.186.50.static.quadranet.com): 1 in the last 3600 secs
2020-01-02 07:44:24
220.130.10.13 attackspam
2020-01-01T18:48:27.347300xentho-1 sshd[365011]: Invalid user com from 220.130.10.13 port 28816
2020-01-01T18:48:27.354229xentho-1 sshd[365011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2020-01-01T18:48:27.347300xentho-1 sshd[365011]: Invalid user com from 220.130.10.13 port 28816
2020-01-01T18:48:29.409511xentho-1 sshd[365011]: Failed password for invalid user com from 220.130.10.13 port 28816 ssh2
2020-01-01T18:50:52.216248xentho-1 sshd[365084]: Invalid user password from 220.130.10.13 port 54710
2020-01-01T18:50:52.225406xentho-1 sshd[365084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
2020-01-01T18:50:52.216248xentho-1 sshd[365084]: Invalid user password from 220.130.10.13 port 54710
2020-01-01T18:50:54.184750xentho-1 sshd[365084]: Failed password for invalid user password from 220.130.10.13 port 54710 ssh2
2020-01-01T18:53:10.798119xentho-1 sshd[365134]: Invalid 
...
2020-01-02 08:00:21
156.67.250.205 attack
Jan  2 00:46:45 MK-Soft-VM7 sshd[27550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.67.250.205 
Jan  2 00:46:47 MK-Soft-VM7 sshd[27550]: Failed password for invalid user sonatine from 156.67.250.205 port 52926 ssh2
...
2020-01-02 08:15:23
170.254.103.200 attackspam
Automatic report - Port Scan Attack
2020-01-02 08:08:42
222.186.15.166 attack
Jan  2 00:47:16 nginx sshd[64186]: Connection from 222.186.15.166 port 23214 on 10.23.102.80 port 22
Jan  2 00:47:17 nginx sshd[64186]: Received disconnect from 222.186.15.166 port 23214:11:  [preauth]
2020-01-02 07:48:37
167.172.215.57 attackbotsspam
this Ip is using hack form system to another beacuse my friend got hacked by this ip just please ban this ip
2020-01-02 07:58:26
80.211.175.209 attackbots
$f2bV_matches
2020-01-02 08:03:58
46.38.144.57 attackbotsspam
Jan  2 00:58:04 localhost postfix/smtpd\[24414\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 00:59:32 localhost postfix/smtpd\[24414\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 01:01:02 localhost postfix/smtpd\[24414\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 01:02:30 localhost postfix/smtpd\[24414\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jan  2 01:03:59 localhost postfix/smtpd\[24414\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-01-02 08:05:52
150.161.8.120 attack
Jan  2 00:42:49 sd-53420 sshd\[2549\]: Invalid user huebener from 150.161.8.120
Jan  2 00:42:49 sd-53420 sshd\[2549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120
Jan  2 00:42:51 sd-53420 sshd\[2549\]: Failed password for invalid user huebener from 150.161.8.120 port 47102 ssh2
Jan  2 00:45:31 sd-53420 sshd\[3415\]: User root from 150.161.8.120 not allowed because none of user's groups are listed in AllowGroups
Jan  2 00:45:31 sd-53420 sshd\[3415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.161.8.120  user=root
...
2020-01-02 07:56:42
23.251.42.20 attack
Invalid user luanda from 23.251.42.20 port 53491
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.42.20
Failed password for invalid user luanda from 23.251.42.20 port 53491 ssh2
Invalid user gmt from 23.251.42.20 port 42005
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.42.20
2020-01-02 07:50:57
182.61.27.140 attackbotsspam
Jan  1 23:50:35 sd-53420 sshd\[17107\]: Invalid user stefan from 182.61.27.140
Jan  1 23:50:35 sd-53420 sshd\[17107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.140
Jan  1 23:50:37 sd-53420 sshd\[17107\]: Failed password for invalid user stefan from 182.61.27.140 port 39224 ssh2
Jan  1 23:53:14 sd-53420 sshd\[17936\]: Invalid user vivyanne from 182.61.27.140
Jan  1 23:53:14 sd-53420 sshd\[17936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.140
...
2020-01-02 07:57:51
125.90.175.66 attackbotsspam
01.01.2020 23:02:08 Connection to port 1666 blocked by firewall
2020-01-02 07:36:42

Recently Reported IPs

53.190.19.153 84.247.237.71 34.139.53.205 252.72.31.239
189.243.239.116 179.211.23.95 37.150.144.223 81.27.1.182
185.188.16.11 7.109.186.94 170.12.50.212 16.108.224.20
151.87.13.160 193.129.37.186 189.36.252.169 170.190.164.0
20.90.186.180 74.92.126.166 122.197.233.146 250.1.112.107