Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Armenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
83.139.6.11 attack
firewall-block, port(s): 445/tcp
2020-09-20 00:58:40
83.139.6.11 attack
firewall-block, port(s): 445/tcp
2020-09-19 16:46:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.139.6.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.139.6.104.			IN	A

;; AUTHORITY SECTION:
.			369	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 18:19:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 104.6.139.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.6.139.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
216.45.43.233 attackspambots
Port 22 Scan, PTR: None
2020-06-27 06:32:20
222.186.169.194 attackbots
sshd jail - ssh hack attempt
2020-06-27 06:15:55
52.251.59.211 attackspambots
Jun 27 00:11:48 abendstille sshd\[13922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.59.211  user=root
Jun 27 00:11:48 abendstille sshd\[13920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.59.211  user=root
Jun 27 00:11:50 abendstille sshd\[13922\]: Failed password for root from 52.251.59.211 port 19317 ssh2
Jun 27 00:11:50 abendstille sshd\[13920\]: Failed password for root from 52.251.59.211 port 19314 ssh2
Jun 27 00:15:14 abendstille sshd\[17434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.251.59.211  user=root
...
2020-06-27 06:29:43
185.173.35.1 attackspam
firewall-block, port(s): 5905/tcp
2020-06-27 06:23:07
69.145.122.159 attackbots
Port 22 Scan, PTR: None
2020-06-27 06:09:38
37.59.48.162 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-27 06:11:18
62.150.141.193 attackspambots
Jun 26 21:05:05 : SSH login attempts with invalid user
2020-06-27 06:30:46
82.77.214.228 attackspambots
Port 22 Scan, PTR: 82-77-214-228.rdsnet.ro.
2020-06-27 06:40:43
106.55.53.38 attackspam
Brute forcing RDP port 3389
2020-06-27 06:24:17
112.85.42.172 attack
Jun 27 00:16:16 mail sshd\[17363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.172  user=root
Jun 27 00:16:18 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:22 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:25 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:27 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
Jun 27 00:16:31 mail sshd\[17363\]: Failed password for root from 112.85.42.172 port 32387 ssh2
...
2020-06-27 06:23:42
89.187.179.56 attackbotsspam
Aaron Kendel
info@comments.goknow.info

Location Information
Huntsville, AL, 35803 us
Area Code: N/A 
System Information
IP Address: 89.187.179.56
UNIX/Mozilla 0.0.0
89.187.179.56 resolves to unn-89-187-179-56.cdn77.com.
2020-06-27 06:33:57
112.85.42.188 attack
06/26/2020-18:15:19.130748 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-27 06:16:44
46.105.132.32 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 27017 proto: TCP cat: Misc Attack
2020-06-27 06:15:05
98.145.151.246 attackbots
Port 22 Scan, PTR: None
2020-06-27 06:27:12
216.59.72.35 attackbots
Port 22 Scan, PTR: None
2020-06-27 06:37:50

Recently Reported IPs

83.139.179.92 83.142.109.110 83.142.55.57 83.142.188.97
83.142.49.215 83.143.245.181 83.143.144.54 83.142.11.248
83.144.166.194 83.144.238.115 83.148.118.10 83.149.21.60
83.149.47.159 83.149.46.165 83.149.47.222 83.147.106.169
83.149.42.241 83.151.233.106 83.165.150.62 83.165.91.56