Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jönköping

Region: Jonkopings

Country: Sweden

Internet Service Provider: Tele2

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.248.38.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60104
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.248.38.39.			IN	A

;; AUTHORITY SECTION:
.			153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024061100 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 11 21:58:32 CST 2024
;; MSG SIZE  rcvd: 105
Host info
39.38.248.83.in-addr.arpa domain name pointer c83-248-38-39.bredband.tele2.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.38.248.83.in-addr.arpa	name = c83-248-38-39.bredband.tele2.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.161.49.29 attackbotsspam
Unauthorized connection attempt from IP address 14.161.49.29 on port 993
2020-08-06 18:53:31
114.35.54.71 attackspambots
Port probing on unauthorized port 23
2020-08-06 19:03:59
113.107.139.68 attack
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(08061028)
2020-08-06 18:37:58
213.217.1.211 attackbots
 TCP (SYN) 213.217.1.211:55429 -> port 3389, len 40
2020-08-06 18:33:41
138.68.226.175 attackspambots
sshd: Failed password for .... from 138.68.226.175 port 53856 ssh2
2020-08-06 19:02:10
149.129.235.128 attack
2020-08-06 07:19:40,603 fail2ban.actions: WARNING [ssh] Ban 149.129.235.128
2020-08-06 19:03:24
52.56.39.34 attackbots
52.56.39.34 - - \[06/Aug/2020:07:19:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6827 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
52.56.39.34 - - \[06/Aug/2020:07:19:40 +0200\] "POST /wp-login.php HTTP/1.0" 200 6642 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
52.56.39.34 - - \[06/Aug/2020:07:19:41 +0200\] "POST /wp-login.php HTTP/1.0" 200 6639 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-06 18:58:52
79.124.62.55 attack
TCP ports : 3389 / 3390 / 4400
2020-08-06 18:30:16
123.207.185.54 attack
SSH brute-force attempt
2020-08-06 18:54:35
58.228.159.253 attack
 TCP (SYN) 58.228.159.253:59537 -> port 3389, len 44
2020-08-06 18:42:14
106.12.55.39 attack
Automatic report - Banned IP Access
2020-08-06 18:50:40
51.83.216.207 attack
2020-08-05 11:49:49 Reject access to port(s):3389 1 times a day
2020-08-06 18:31:07
193.176.86.170 attackbots
0,17-15/21 [bc05/m73] PostRequest-Spammer scoring: zurich
2020-08-06 19:06:27
61.177.172.142 attackbotsspam
W 5701,/var/log/auth.log,-,-
2020-08-06 18:48:43
45.129.33.15 attackspam
 TCP (SYN) 45.129.33.15:45280 -> port 8837, len 44
2020-08-06 18:45:59

Recently Reported IPs

181.108.228.74 155.241.196.40 205.216.229.88 114.171.171.248
43.229.36.48 88.175.252.85 222.100.185.69 138.114.236.141
205.226.213.146 53.196.112.35 100.4.158.176 167.221.107.186
36.118.30.17 134.35.191.233 198.186.143.60 220.104.222.147
138.224.137.51 144.217.41.81 160.245.131.245 217.193.109.116