Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.214.214.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.214.214.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 134 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:35:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 148.214.214.83.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 83.214.214.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
173.18.24.154 attackbotsspam
leo_www
2020-10-01 00:32:53
111.229.167.10 attackspambots
Invalid user cpanel1 from 111.229.167.10 port 54044
2020-10-01 00:38:59
31.163.203.54 attackspambots
Sep 30 19:11:18 hosting sshd[14788]: Invalid user nagios from 31.163.203.54 port 50388
...
2020-10-01 00:26:29
104.131.65.184 attackbots
2020-09-30T12:24:52.967747mail.thespaminator.com sshd[11083]: Invalid user flex from 104.131.65.184 port 54274
2020-09-30T12:24:55.014675mail.thespaminator.com sshd[11083]: Failed password for invalid user flex from 104.131.65.184 port 54274 ssh2
...
2020-10-01 00:34:15
139.59.11.66 attack
Invalid user admin from 139.59.11.66 port 48246
2020-10-01 00:39:37
88.132.66.26 attackspam
Sep 30 23:14:32 itv-usvr-02 sshd[7336]: Invalid user christian from 88.132.66.26 port 59428
Sep 30 23:14:32 itv-usvr-02 sshd[7336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.132.66.26
Sep 30 23:14:32 itv-usvr-02 sshd[7336]: Invalid user christian from 88.132.66.26 port 59428
Sep 30 23:14:35 itv-usvr-02 sshd[7336]: Failed password for invalid user christian from 88.132.66.26 port 59428 ssh2
Sep 30 23:17:56 itv-usvr-02 sshd[7463]: Invalid user jackie from 88.132.66.26 port 33460
2020-10-01 00:50:37
51.178.182.35 attackspambots
(sshd) Failed SSH login from 51.178.182.35 (FR/France/35.ip-51-178-182.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 30 10:27:50 optimus sshd[8080]: Invalid user netdump from 51.178.182.35
Sep 30 10:27:50 optimus sshd[8080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35 
Sep 30 10:27:52 optimus sshd[8080]: Failed password for invalid user netdump from 51.178.182.35 port 41774 ssh2
Sep 30 10:32:48 optimus sshd[9606]: Invalid user master from 51.178.182.35
Sep 30 10:32:48 optimus sshd[9606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35
2020-10-01 00:35:25
82.196.3.36 attackspambots
Invalid user csgo from 82.196.3.36 port 43348
2020-10-01 00:37:30
101.89.63.136 attack
101.89.63.136 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 30 08:42:57 server2 sshd[7870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.6.166  user=root
Sep 30 08:39:51 server2 sshd[1917]: Failed password for root from 128.116.154.5 port 33058 ssh2
Sep 30 08:39:00 server2 sshd[1412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.63.136  user=root
Sep 30 08:39:02 server2 sshd[1412]: Failed password for root from 101.89.63.136 port 32992 ssh2
Sep 30 08:40:45 server2 sshd[2568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.175.247  user=root
Sep 30 08:40:47 server2 sshd[2568]: Failed password for root from 103.45.175.247 port 53816 ssh2

IP Addresses Blocked:

59.124.6.166 (TW/Taiwan/-)
128.116.154.5 (IT/Italy/-)
2020-10-01 00:53:35
117.71.57.195 attack
Sep 30 14:04:19 lnxweb62 sshd[28781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.71.57.195
Sep 30 14:04:19 lnxweb62 sshd[28781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.71.57.195
2020-10-01 00:32:07
45.129.33.123 attackbotsspam
 TCP (SYN) 45.129.33.123:42708 -> port 31313, len 44
2020-10-01 00:22:10
159.65.50.6 attackbots
159.65.50.6 is unauthorized and has been banned by fail2ban
2020-10-01 00:33:09
45.129.33.49 attack
*Port Scan* detected from 45.129.33.49 (DE/Germany/-). 11 hits in the last 210 seconds
2020-10-01 00:23:38
185.57.152.70 attackspam
185.57.152.70 - - [30/Sep/2020:18:42:28 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.57.152.70 - - [30/Sep/2020:18:42:29 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.57.152.70 - - [30/Sep/2020:18:42:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-01 00:51:09
157.230.36.192 attack
Port Scan: TCP/443
2020-10-01 00:34:56

Recently Reported IPs

164.225.179.50 50.134.135.224 142.96.84.35 210.54.191.101
243.241.71.190 25.247.223.184 162.165.119.163 59.197.36.4
69.31.10.44 144.0.91.143 187.159.140.205 194.155.92.77
142.59.116.17 127.43.160.60 185.212.119.192 170.217.128.227
186.201.235.42 159.235.104.149 241.25.250.12 176.199.211.166