Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bromley

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: Sky UK Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.3.213.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1000
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.3.213.83.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 20:21:00 CST 2019
;; MSG SIZE  rcvd: 115

Host info
83.213.3.94.in-addr.arpa domain name pointer 5e03d553.bb.sky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 83.213.3.94.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
165.227.170.117 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-04 23:42:17
185.33.134.14 attackbotsspam
5555/tcp
[2020-10-03]1pkt
2020-10-04 23:47:31
47.254.238.150 attackspambots
Automatic report - Banned IP Access
2020-10-04 23:07:33
182.112.31.85 attack
8080/udp
[2020-10-03]1pkt
2020-10-04 23:45:55
154.57.193.2 attackbots
 TCP (SYN) 154.57.193.2:41096 -> port 445, len 44
2020-10-04 23:09:11
89.242.123.84 attack
8080/tcp
[2020-10-03]1pkt
2020-10-04 23:52:12
35.239.143.173 attackspam
IP already banned
2020-10-04 23:31:50
220.128.159.121 attack
$f2bV_matches
2020-10-04 23:40:58
139.99.8.3 attackspambots
139.99.8.3 - - [04/Oct/2020:13:02:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2591 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.8.3 - - [04/Oct/2020:13:02:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2528 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.99.8.3 - - [04/Oct/2020:13:02:42 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-04 23:33:19
112.85.42.117 attackspam
Failed password for root from 112.85.42.117 port 1332 ssh2
Failed password for root from 112.85.42.117 port 1332 ssh2
Failed password for root from 112.85.42.117 port 1332 ssh2
Failed password for root from 112.85.42.117 port 1332 ssh2
2020-10-04 23:09:52
45.153.203.104 attack
SSH Brute Force
2020-10-04 23:18:01
37.187.181.155 attackbots
Brute%20Force%20SSH
2020-10-04 23:16:47
175.151.231.250 attackbots
23/tcp 23/tcp
[2020-10-01/02]2pkt
2020-10-04 23:13:08
189.51.118.22 attackbots
 TCP (SYN) 189.51.118.22:43838 -> port 445, len 44
2020-10-04 23:33:35
141.98.81.88 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-04 23:06:59

Recently Reported IPs

180.191.97.95 196.129.191.235 198.15.134.135 96.47.228.114
49.73.229.251 37.186.65.135 43.250.42.128 100.217.5.31
162.144.242.147 146.185.11.49 206.11.189.19 174.194.143.20
144.118.44.23 182.253.192.20 206.84.207.60 165.22.248.19
138.120.144.198 191.193.253.170 113.187.83.175 61.178.245.25