Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.99.135.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11938
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.99.135.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:32:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
80.135.99.83.in-addr.arpa domain name pointer balticom-135-80.balticom.lv.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.135.99.83.in-addr.arpa	name = balticom-135-80.balticom.lv.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.14.199.49 attack
Apr 21 17:36:28 v22018086721571380 sshd[28671]: Failed password for invalid user admin from 83.14.199.49 port 52672 ssh2
Apr 21 18:38:23 v22018086721571380 sshd[11188]: Failed password for invalid user sn from 83.14.199.49 port 42722 ssh2
2020-04-22 01:31:48
218.71.141.62 attack
(sshd) Failed SSH login from 218.71.141.62 (mx.d-thinker.org): 5 in the last 3600 secs
2020-04-22 01:55:25
35.220.251.197 attackbotsspam
Invalid user testftp from 35.220.251.197 port 42334
2020-04-22 01:46:58
13.82.209.176 attack
2020-04-21T15:32:45.550933abusebot-6.cloudsearch.cf sshd[32487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.209.176  user=root
2020-04-21T15:32:48.102937abusebot-6.cloudsearch.cf sshd[32487]: Failed password for root from 13.82.209.176 port 50564 ssh2
2020-04-21T15:36:54.986099abusebot-6.cloudsearch.cf sshd[32699]: Invalid user qf from 13.82.209.176 port 38710
2020-04-21T15:36:54.994302abusebot-6.cloudsearch.cf sshd[32699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.209.176
2020-04-21T15:36:54.986099abusebot-6.cloudsearch.cf sshd[32699]: Invalid user qf from 13.82.209.176 port 38710
2020-04-21T15:36:57.395678abusebot-6.cloudsearch.cf sshd[32699]: Failed password for invalid user qf from 13.82.209.176 port 38710 ssh2
2020-04-21T15:41:29.123666abusebot-6.cloudsearch.cf sshd[528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.209.176  user=r
...
2020-04-22 01:52:22
212.129.242.171 attack
SSH Brute Force
2020-04-22 01:58:06
51.75.126.115 attack
(sshd) Failed SSH login from 51.75.126.115 (FR/France/115.ip-51-75-126.eu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 21 19:01:35 ubnt-55d23 sshd[12052]: Invalid user ubuntu from 51.75.126.115 port 55796
Apr 21 19:01:38 ubnt-55d23 sshd[12052]: Failed password for invalid user ubuntu from 51.75.126.115 port 55796 ssh2
2020-04-22 01:40:04
106.12.69.90 attackbotsspam
$f2bV_matches
2020-04-22 01:22:37
49.234.212.15 attackspambots
SSH login attempts.
2020-04-22 01:41:15
45.190.220.14 attack
Invalid user admin from 45.190.220.14 port 55762
2020-04-22 01:43:29
106.13.35.176 attack
Port probing on unauthorized port 1239
2020-04-22 01:20:47
46.51.219.44 attack
Invalid user git from 46.51.219.44 port 9224
2020-04-22 01:42:53
206.189.47.166 attackspambots
Apr 21 19:44:15 mail sshd[3096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166
Apr 21 19:44:17 mail sshd[3096]: Failed password for invalid user vp from 206.189.47.166 port 34984 ssh2
Apr 21 19:48:38 mail sshd[3875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.47.166
2020-04-22 01:59:48
46.101.245.176 attackspambots
Brute-force attempt banned
2020-04-22 01:42:21
222.240.223.85 attackspambots
SSH login attempts.
2020-04-22 01:53:55
221.229.162.189 attackspambots
Invalid user dev from 221.229.162.189 port 7945
2020-04-22 01:54:51

Recently Reported IPs

29.198.36.185 16.161.2.237 18.185.81.70 58.126.72.222
33.42.130.210 83.93.65.82 159.81.126.183 86.88.120.186
229.145.96.184 197.197.75.184 57.105.229.182 144.154.18.24
154.197.88.25 142.65.22.187 90.185.202.11 61.142.222.233
77.175.246.174 71.163.138.172 108.61.75.176 121.78.120.217