Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
83.142.52.107 attackspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-01-24 21:58:53
83.142.52.138 attackspambots
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2019-11-09 19:59:27
83.142.52.229 attack
83.142.52.229 - - [20/Oct/2019:07:59:46 -0400] "GET /?page=../../etc/passwd%00&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16393 "https://newportbrassfaucets.com/?page=../../etc/passwd%00&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
83.142.52.229 - - [20/Oct/2019:07:59:47 -0400] "GET /?page=..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 16398 "https://newportbrassfaucets.com/?page=..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-21 01:21:06
83.142.52.44 attack
83.142.52.44 - - [20/Oct/2019:08:03:57 -0400] "GET /?page=products&action=../../../../etc/passwd&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 17147 "https://newportbrassfaucets.com/?page=products&action=../../../../etc/passwd&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-20 21:36:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.142.52.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.142.52.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 08:13:57 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 70.52.142.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.52.142.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.35.148 attackspam
Trying ports that it shouldn't be.
2019-07-02 11:36:40
186.115.10.158 attackbotsspam
Unauthorized connection attempt from IP address 186.115.10.158 on Port 445(SMB)
2019-07-02 11:25:46
103.53.188.122 attackspambots
Unauthorized connection attempt from IP address 103.53.188.122 on Port 445(SMB)
2019-07-02 11:06:19
190.104.123.80 attackbots
Trying to deliver email spam, but blocked by RBL
2019-07-02 11:17:35
182.75.16.194 attackspam
Unauthorized connection attempt from IP address 182.75.16.194 on Port 445(SMB)
2019-07-02 10:57:07
218.64.216.83 attackbots
Unauthorized connection attempt from IP address 218.64.216.83 on Port 445(SMB)
2019-07-02 11:30:02
203.189.252.50 attack
Unauthorized connection attempt from IP address 203.189.252.50 on Port 445(SMB)
2019-07-02 11:13:59
185.176.27.166 attackspam
02.07.2019 02:31:02 Connection to port 49358 blocked by firewall
2019-07-02 11:32:16
114.32.230.189 attack
Feb 26 07:58:21 motanud sshd\[14331\]: Invalid user cecil from 114.32.230.189 port 56965
Feb 26 07:58:21 motanud sshd\[14331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.230.189
Feb 26 07:58:23 motanud sshd\[14331\]: Failed password for invalid user cecil from 114.32.230.189 port 56965 ssh2
2019-07-02 11:14:16
202.28.64.1 attack
Jul  2 01:53:24 vps691689 sshd[11948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.28.64.1
Jul  2 01:53:25 vps691689 sshd[11948]: Failed password for invalid user kirk from 202.28.64.1 port 49370 ssh2
Jul  2 01:56:04 vps691689 sshd[11971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.28.64.1
...
2019-07-02 11:25:23
184.57.98.66 attackbotsspam
7 failed attempt(s) in the last 24h
2019-07-02 11:32:50
27.72.170.99 attackspambots
Unauthorized connection attempt from IP address 27.72.170.99 on Port 445(SMB)
2019-07-02 11:28:14
210.207.54.60 attack
3389BruteforceFW21
2019-07-02 11:30:22
39.65.97.167 attackspambots
7 failed attempt(s) in the last 24h
2019-07-02 11:30:54
91.127.48.149 attack
Trying to deliver email spam, but blocked by RBL
2019-07-02 10:59:35

Recently Reported IPs

118.12.129.84 204.145.64.42 217.73.97.112 129.203.30.16
227.207.83.132 252.156.50.61 138.197.222.178 2.78.208.143
193.149.59.86 207.190.85.217 145.241.11.241 52.123.12.181
33.120.233.33 194.12.198.4 221.189.131.106 239.73.20.60
69.215.39.167 186.145.210.246 194.29.194.55 32.74.225.60