Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: Free

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '83.214.128.0 - 83.214.255.255'

% Abuse contact for '83.214.128.0 - 83.214.255.255' is 'abuse@proxad.net'

inetnum:        83.214.128.0 - 83.214.255.255
netname:        TIF-20030422
descr:          Telecom Italia France
descr:          broadband pools
country:        FR
admin-c:        BG34
admin-c:        LTAD1-RIPE
tech-c:         TTFR1-RIPE
status:         ASSIGNED PA
remarks:        ******************
remarks:        All abuse requests MUST be sent to
remarks:        'abuse@tiscali.fr' and the logs must
remarks:        include the timezone and GMT offset.
remarks:        ripe-mnt@net.tiscali.fr IS NOT the
remarks:        mail to use to report abuses.
remarks:        Toute requete abuse DOIT etre envoyee
remarks:        a 'abuse@tiscali.fr' et les logs
remarks:        doivent inclure l'heure exacte et le
remarks:        decalage GMT.
remarks:        ripe-mnt@net.tiscali.fr N'EST PAS
remarks:        le mail a utiliser pour signaler
remarks:        un abus.
remarks:        ******************
mnt-by:         MNT-TISCALIFR
mnt-lower:      MNT-TISCALIFR
remarks:        Tag: Int
created:        2005-11-22T11:29:16Z
last-modified:  2005-11-22T11:29:16Z
source:         RIPE

role:           SCALEWAY
remarks:        also known as Online S.A.S. / Iliad-Entreprises
address:        8, rue de la ville l'eveque
address:        75008 Paris
address:        France
admin-c:        IENT-RIPE
tech-c:         IENT-RIPE
nic-hdl:        LTAD1-RIPE
mnt-by:         MNT-TISCALIFR
mnt-by:         ONLINE-NET-MNT
created:        2002-09-24T15:24:32Z
last-modified:  2024-07-04T08:12:58Z
source:         RIPE # Filtered

role:           SCALEWAY
remarks:        known as Online S.A.S. / Iliad-Entreprises
address:        8 rue de la ville l'vque
address:        75008 Paris
address:        France
abuse-mailbox:  abuse@scaleway.com
admin-c:        IENT-RIPE
tech-c:         IENT-RIPE
nic-hdl:        TTFR1-RIPE
mnt-by:         MNT-TISCALIFR
mnt-by:         ONLINE-NET-MNT
created:        2002-09-24T14:16:42Z
last-modified:  2024-07-04T08:07:45Z
source:         RIPE # Filtered

person:         Benoit Grange
address:        Tiscali Telecom
address:        37 bis rue Greneta
address:        75002 Paris - France
phone:          +33 1 45 08 20 00
fax-no:         +33 1 45 08 20 01
remarks:        +-----------------------------------------------------------------------+
remarks:        | ATTENTION: Pour nous signaler un probleme (intrusion, spam, etc),     |
remarks:        | merci de respecter la procedure suivante:                             |
remarks:        | Envoyer un mail a "abuse@tiscali.fr" avec les informations suivantes: |
remarks:        | - date & heure (y compris le fuseau horaire ou l'heure GMT)           |
remarks:        | - adresse IP source ou toutes les en-tetes du mail                    |
remarks:        | - nature du probleme (en quelques mots)                               |
remarks:        | Nous ne repondons pas aux demandes par telephone.                     |
remarks:        | - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
remarks:        | Je ne suis que le representant legal de Tiscali et non pas            |
remarks:        | l'utilisateur final de l'adresse IP renvoyee par votre firewall       |
remarks:        | Les adresses IP sont generalement allouees dynamiquement a nos abonnes|
remarks:        | et donc votre logiciel ne peut PAS connaitre le nom de l'utilisateur  |
remarks:        | reel de l'IP. Merci d'avoir lu jusqu'au bout.                         |
remarks:        +-----------------------------------------------------------------------+
nic-hdl:        BG34
mnt-by:         MNT-TISCALIFR
created:        2002-04-29T09:56:13Z
last-modified:  2003-04-16T10:16:31Z
source:         RIPE # Filtered

% Information related to '83.214.0.0/16AS12322'

route:          83.214.0.0/16
descr:          Free SAS
origin:         AS12322
mnt-by:         PROXAD-MNT
created:        2013-08-05T10:41:49Z
last-modified:  2013-08-05T10:43:50Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.214.239.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42361
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.214.239.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 09:08:39 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 115.239.214.83.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 83.214.239.115.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
112.6.231.114 attack
DATE:2020-04-15 17:11:36, IP:112.6.231.114, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-16 03:39:51
152.32.135.17 attackbots
Invalid user basesystem from 152.32.135.17 port 37874
2020-04-16 03:20:08
138.68.99.46 attackspam
2020-04-13 18:27:16 server sshd[83124]: Failed password for invalid user robyn from 138.68.99.46 port 54074 ssh2
2020-04-16 03:52:03
125.69.68.125 attack
Apr 15 21:05:31 vpn01 sshd[6220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.69.68.125
Apr 15 21:05:34 vpn01 sshd[6220]: Failed password for invalid user max from 125.69.68.125 port 24076 ssh2
...
2020-04-16 03:26:58
222.124.16.227 attackspam
$f2bV_matches
2020-04-16 03:19:37
113.88.165.66 attack
Apr 15 12:17:01 debian sshd[375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.66 
Apr 15 12:17:02 debian sshd[375]: Failed password for invalid user user from 113.88.165.66 port 40808 ssh2
Apr 15 12:24:08 debian sshd[393]: Failed password for root from 113.88.165.66 port 49162 ssh2
2020-04-16 03:39:37
113.137.36.187 attack
SSH Brute-Force reported by Fail2Ban
2020-04-16 03:39:17
104.148.41.63 attackbotsspam
Return-Path: 
Delivered-To: hide@mx1.tees.ne.jp
Received: (qmail 31403 invoked
 by uid 0);
 15 Apr 2020 12:57:53 +0900
Received: from unknown (HELO rcvgw11.tees.ne.jp) (202.216.138.25)
 by mdl.tees.ne.jp
 with SMTP;
 15 Apr 2020 12:57:53 +0900
Received: from smtp.work (unknown [104.148.41.63])
 by rcvgw11.tees.ne.jp (Postfix)
 with ESMTP id 7DBD520C36 for ;
 Wed, 15 Apr 2020 12:57:53 +0900 (JST)
Subject: [Norton AntiSpam]コロナウイルス撲滅セール
From: info@q04.402smtp.work
To: hide@mx1.tees.ne.jp
Message-ID: 20200415125643
Content-Type: text/plain; charset="SHIFT_JIS"
Content-Transfer-Encoding: 7bit
MIME-Version: 1.0
X-Brightmail-Tracker: AAAABjVkWnA1ZDecGo+sLDRHjzs0R6FLNEkVcA==
2020-04-16 03:18:46
106.12.34.97 attackspam
$f2bV_matches
2020-04-16 03:51:24
141.196.99.184 attack
20/4/15@08:06:49: FAIL: Alarm-Network address from=141.196.99.184
20/4/15@08:06:50: FAIL: Alarm-Network address from=141.196.99.184
...
2020-04-16 03:47:20
114.98.126.14 attackbots
Invalid user RSBCMON from 114.98.126.14 port 45396
2020-04-16 03:37:38
134.122.19.102 attackbots
2020-04-15T20:11:40.735348rocketchat.forhosting.nl sshd[8551]: Invalid user nuxeo from 134.122.19.102 port 35670
2020-04-15T20:11:42.984514rocketchat.forhosting.nl sshd[8551]: Failed password for invalid user nuxeo from 134.122.19.102 port 35670 ssh2
2020-04-15T20:17:03.021534rocketchat.forhosting.nl sshd[8682]: Invalid user tidb from 134.122.19.102 port 50326
...
2020-04-16 03:24:14
121.162.235.44 attackbots
Apr 15 18:17:09 server sshd[25240]: Failed password for tom from 121.162.235.44 port 50956 ssh2
Apr 15 18:19:01 server sshd[26864]: Failed password for invalid user ja from 121.162.235.44 port 50072 ssh2
Apr 15 18:21:00 server sshd[28700]: Failed password for invalid user gang from 121.162.235.44 port 49192 ssh2
2020-04-16 03:32:35
193.111.155.177 attackbots
Spam
2020-04-16 03:45:58
106.12.186.74 attack
2020-04-13 15:17:02 server sshd[76302]: Failed password for invalid user ahmed from 106.12.186.74 port 54128 ssh2
2020-04-16 03:50:37

Recently Reported IPs

38.54.124.39 78.132.5.119 66.128.162.204 46.93.97.238
238.207.5.94 196.50.22.126 192.68.1.136 182.185.91.13
168.174.160.58 168.140.118.73 167.146.70.41 2a02:8108:94c0:4a28:ec2e:766b:a054:161a
195.24.143.18 199.15.184.192 194.128.64.174 172.211.170.5
86.69.75.186 111.57.152.179 102.184.95.30 111.225.149.192