Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.190.215.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;83.190.215.48.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031202 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 05:09:42 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 48.215.190.83.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.215.190.83.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
210.179.249.45 attackbotsspam
Aug  4 06:39:24 inter-technics sshd[9465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.249.45  user=root
Aug  4 06:39:26 inter-technics sshd[9465]: Failed password for root from 210.179.249.45 port 39510 ssh2
Aug  4 06:43:54 inter-technics sshd[9693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.249.45  user=root
Aug  4 06:43:56 inter-technics sshd[9693]: Failed password for root from 210.179.249.45 port 52730 ssh2
Aug  4 06:48:20 inter-technics sshd[9968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.249.45  user=root
Aug  4 06:48:22 inter-technics sshd[9968]: Failed password for root from 210.179.249.45 port 37722 ssh2
...
2020-08-04 14:22:07
107.172.255.213 attackspam
7,40-07/07 [bc04/m145] PostRequest-Spammer scoring: wien2018
2020-08-04 14:31:33
176.122.129.114 attack
2020-08-04T07:52:09.778074+02:00  sshd[11995]: Failed password for root from 176.122.129.114 port 38582 ssh2
2020-08-04 14:18:05
128.199.112.240 attackspam
2020-08-04T03:52:35.843542shield sshd\[25681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.112.240  user=root
2020-08-04T03:52:38.419595shield sshd\[25681\]: Failed password for root from 128.199.112.240 port 48706 ssh2
2020-08-04T03:54:07.680906shield sshd\[25777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.112.240  user=root
2020-08-04T03:54:09.889869shield sshd\[25777\]: Failed password for root from 128.199.112.240 port 41420 ssh2
2020-08-04T03:55:34.775565shield sshd\[25931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.112.240  user=root
2020-08-04 14:43:27
121.227.153.232 attackspam
Aug  4 04:27:40 vps-51d81928 sshd[433709]: Failed password for root from 121.227.153.232 port 39568 ssh2
Aug  4 04:29:23 vps-51d81928 sshd[433834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.153.232  user=root
Aug  4 04:29:25 vps-51d81928 sshd[433834]: Failed password for root from 121.227.153.232 port 45491 ssh2
Aug  4 04:32:18 vps-51d81928 sshd[434070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.153.232  user=root
Aug  4 04:32:21 vps-51d81928 sshd[434070]: Failed password for root from 121.227.153.232 port 57331 ssh2
...
2020-08-04 14:25:27
36.85.77.155 attack
Automatic report - Port Scan Attack
2020-08-04 14:44:23
186.136.192.140 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-04 14:29:26
60.167.176.247 attackspam
(sshd) Failed SSH login from 60.167.176.247 (CN/China/-): 5 in the last 3600 secs
2020-08-04 14:49:31
103.78.180.118 attackspam
20/8/3@23:55:47: FAIL: Alarm-Telnet address from=103.78.180.118
...
2020-08-04 14:36:58
176.109.228.28 attackspambots
" "
2020-08-04 14:27:40
173.208.130.202 attack
20 attempts against mh-misbehave-ban on twig
2020-08-04 14:18:16
188.169.237.90 attackbots
REQUESTED PAGE: /HNAP1/
2020-08-04 14:52:55
80.82.77.245 attackbots
Persistent port scanning [13 denied]
2020-08-04 14:22:47
59.34.233.229 attackbotsspam
Aug  4 06:16:28 scw-6657dc sshd[13000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.34.233.229  user=root
Aug  4 06:16:28 scw-6657dc sshd[13000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.34.233.229  user=root
Aug  4 06:16:30 scw-6657dc sshd[13000]: Failed password for root from 59.34.233.229 port 58996 ssh2
...
2020-08-04 14:41:14
113.161.79.191 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-04 14:36:05

Recently Reported IPs

31.167.150.23 31.145.204.87 78.137.57.181 218.49.245.101
31.18.189.41 2.176.73.44 58.121.97.41 170.51.244.145
27.97.35.151 27.79.226.246 170.51.246.3 89.149.124.213
80.14.54.33 170.51.246.2 170.51.248.17 93.233.5.2
170.51.244.143 186.226.83.75 217.60.200.171 123.20.143.46