Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.213.140.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.213.140.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:10:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
34.140.213.83.in-addr.arpa domain name pointer 34.83-213-140.dynamic.clientes.euskaltel.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.140.213.83.in-addr.arpa	name = 34.83-213-140.dynamic.clientes.euskaltel.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.96.70.21 attackspam
Unauthorized connection attempt detected from IP address 114.96.70.21 to port 80
2020-06-29 03:55:46
183.157.169.208 attack
Unauthorised access (Jun 28) SRC=183.157.169.208 LEN=40 TTL=53 ID=3025 TCP DPT=23 WINDOW=52459 SYN
2020-06-29 03:27:56
49.51.161.145 attackspam
Unauthorized connection attempt detected from IP address 49.51.161.145 to port 25
2020-06-29 04:04:32
177.125.79.197 attackspambots
Unauthorized connection attempt detected from IP address 177.125.79.197 to port 80
2020-06-29 03:51:26
50.252.197.166 attack
Unauthorized connection attempt detected from IP address 50.252.197.166 to port 80
2020-06-29 03:42:03
168.205.38.192 attackbots
Unauthorized connection attempt detected from IP address 168.205.38.192 to port 8080
2020-06-29 03:53:49
152.115.73.190 attackspam
Unauthorized connection attempt detected from IP address 152.115.73.190 to port 80
2020-06-29 03:32:37
175.213.25.192 attack
Unauthorized connection attempt detected from IP address 175.213.25.192 to port 81
2020-06-29 03:52:52
115.209.86.178 attack
Unauthorized connection attempt detected from IP address 115.209.86.178 to port 23
2020-06-29 03:35:20
5.154.54.120 attackbotsspam
Unauthorized connection attempt detected from IP address 5.154.54.120 to port 8080
2020-06-29 03:43:55
177.155.36.240 attackspam
 TCP (SYN) 177.155.36.240:60258 -> port 23, len 44
2020-06-29 03:29:40
222.108.172.197 attack
Unauthorized connection attempt detected from IP address 222.108.172.197 to port 8000
2020-06-29 04:06:47
51.178.52.56 attackbotsspam
2020-06-27T03:40:25.459633hostname sshd[50769]: Failed password for invalid user postgres from 51.178.52.56 port 43672 ssh2
...
2020-06-29 03:41:42
106.13.48.122 attackbotsspam
Unauthorized connection attempt detected from IP address 106.13.48.122 to port 1741
2020-06-29 03:37:13
178.165.45.6 attackbots
Unauthorized connection attempt detected from IP address 178.165.45.6 to port 8080
2020-06-29 03:50:11

Recently Reported IPs

96.144.104.22 246.85.178.223 179.78.169.18 103.40.226.190
108.5.86.236 31.207.92.173 228.34.9.60 117.169.159.27
164.163.12.168 2.100.183.210 19.21.245.159 56.233.56.253
255.118.207.61 204.138.20.13 181.67.124.28 15.38.193.85
93.33.138.251 66.250.231.73 144.122.134.238 95.204.117.110