Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.219.149.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.219.149.1.			IN	A

;; AUTHORITY SECTION:
.			266	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:51:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
1.149.219.83.in-addr.arpa domain name pointer ppp-static11-1.tis-dialog.ru.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.149.219.83.in-addr.arpa	name = ppp-static11-1.tis-dialog.ru.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.202.239.157 attackspambots
E-Mail Spam (RBL) [REJECTED]
2020-09-19 12:36:33
116.12.251.132 attackbotsspam
$f2bV_matches
2020-09-19 12:14:40
94.73.34.22 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-19 12:08:53
172.68.186.18 attackspambots
Web Probe / Attack
2020-09-19 12:01:25
27.6.159.253 attack
Unauthorised access (Sep 18) SRC=27.6.159.253 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=3944 TCP DPT=23 WINDOW=4200 SYN
2020-09-19 12:25:20
91.217.76.171 attackbotsspam
82.165.159.130
91.217.76.171
2020-09-19 12:10:42
195.54.160.180 attack
SSH-BruteForce
2020-09-19 12:15:33
140.143.2.24 attackbotsspam
Fail2Ban Ban Triggered
2020-09-19 12:22:06
149.56.15.136 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-19T03:13:07Z
2020-09-19 12:02:18
111.93.10.213 attackbots
20 attempts against mh-ssh on echoip
2020-09-19 12:08:24
116.73.196.126 attackspam
port scan and connect, tcp 23 (telnet)
2020-09-19 12:16:51
107.170.20.247 attackspam
Sep 19 00:09:11 firewall sshd[15399]: Invalid user server from 107.170.20.247
Sep 19 00:09:13 firewall sshd[15399]: Failed password for invalid user server from 107.170.20.247 port 50826 ssh2
Sep 19 00:13:26 firewall sshd[15512]: Invalid user debian from 107.170.20.247
...
2020-09-19 12:20:18
151.253.125.136 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-19 12:40:50
120.131.3.91 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=52338  .  dstport=17489  .     (2881)
2020-09-19 12:40:37
112.85.42.232 attack
Sep 19 06:04:53 abendstille sshd\[1378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep 19 06:04:55 abendstille sshd\[1378\]: Failed password for root from 112.85.42.232 port 34223 ssh2
Sep 19 06:04:57 abendstille sshd\[1378\]: Failed password for root from 112.85.42.232 port 34223 ssh2
Sep 19 06:04:59 abendstille sshd\[1458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.232  user=root
Sep 19 06:04:59 abendstille sshd\[1378\]: Failed password for root from 112.85.42.232 port 34223 ssh2
...
2020-09-19 12:19:09

Recently Reported IPs

83.221.194.16 83.228.37.244 83.229.87.66 83.23.63.86
83.23.48.5 83.233.177.169 83.23.65.77 83.233.110.190
83.227.70.49 83.23.24.14 83.234.245.24 83.239.58.190
83.234.218.231 83.239.144.130 83.239.140.67 83.239.111.246
83.234.50.192 83.244.29.161 83.250.86.33 83.250.4.5