Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gunnarskog

Region: Varmlands

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.140.33.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.140.33.116.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022501 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 12:09:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 116.33.140.83.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 116.33.140.83.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.164.50.252 attackbotsspam
Feb 14 05:55:52  sshd[32079]: Failed password for invalid user rogene from 49.164.50.252 port 41478 ssh2
2020-02-14 15:46:50
216.80.26.83 attackbotsspam
Feb 14 08:11:51 vps647732 sshd[12551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.80.26.83
Feb 14 08:11:53 vps647732 sshd[12551]: Failed password for invalid user rachel from 216.80.26.83 port 60255 ssh2
...
2020-02-14 15:28:53
90.3.194.84 attackspam
SSH-bruteforce attempts
2020-02-14 15:10:51
124.158.174.122 attackspam
ssh brute force
2020-02-14 15:25:14
119.62.46.196 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 15:42:03
119.75.178.129 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 15:16:23
119.63.247.214 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 15:37:10
168.235.104.161 attackspambots
Unauthorized connection attempt detected from IP address 168.235.104.161 to port 445
2020-02-14 15:33:44
180.250.12.19 attack
Unauthorised access (Feb 14) SRC=180.250.12.19 LEN=40 TTL=245 ID=62768 TCP DPT=1433 WINDOW=1024 SYN
2020-02-14 15:35:55
203.93.121.34 attackspam
Feb 14 06:21:35 plex sshd[32015]: Invalid user shui from 203.93.121.34 port 54855
2020-02-14 15:21:59
103.139.44.174 attackbots
firewall-block, port(s): 3389/tcp
2020-02-14 15:49:29
45.43.29.52 attackbotsspam
Portscan detected
2020-02-14 15:29:14
119.65.220.168 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 15:35:07
119.6.171.97 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-14 15:44:34
78.131.56.62 attackspam
[AUTOMATIC REPORT] - 21 tries in total - SSH BRUTE FORCE - IP banned
2020-02-14 15:51:42

Recently Reported IPs

159.190.240.4 133.11.133.52 23.198.154.223 150.215.131.72
43.106.134.32 156.226.199.22 33.219.211.223 187.187.60.190
52.136.252.10 247.127.194.204 93.228.75.59 89.9.231.159
48.220.203.248 251.157.122.230 225.5.158.191 194.114.111.57
193.59.252.196 139.39.67.108 26.7.16.245 83.61.136.135