Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.82.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34944
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.82.12.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:37:57 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 12.82.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.82.16.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.148.177 attackspam
Dec  9 12:44:43 MK-Soft-Root1 sshd[16063]: Failed password for root from 138.68.148.177 port 49296 ssh2
...
2019-12-09 20:13:37
112.85.42.178 attackspam
Dec  9 14:09:05 sauna sshd[72391]: Failed password for root from 112.85.42.178 port 16046 ssh2
Dec  9 14:09:09 sauna sshd[72391]: Failed password for root from 112.85.42.178 port 16046 ssh2
...
2019-12-09 20:15:23
83.97.20.145 attackbotsspam
Host Scan
2019-12-09 20:22:54
123.21.33.151 attack
SSH Brute-Force attacks
2019-12-09 20:22:07
103.57.185.54 attack
Dec  9 13:38:12 our-server-hostname postfix/smtpd[12889]: connect from unknown[103.57.185.54]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec  9 13:38:17 our-server-hostname postfix/smtpd[12889]: lost connection after RCPT from unknown[103.57.185.54]
Dec  9 13:38:17 our-server-hostname postfix/smtpd[12889]: disconnect from unknown[103.57.185.54]
Dec  9 16:37:42 our-server-hostname postfix/smtpd[27052]: connect from unknown[103.57.185.54]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.57.185.54
2019-12-09 20:15:47
118.24.178.224 attackspam
$f2bV_matches
2019-12-09 20:42:38
186.46.43.125 attackbotsspam
20 attempts against mh_ha-misbehave-ban on ice.magehost.pro
2019-12-09 20:44:09
123.231.44.71 attackspam
Dec  9 08:27:14 sauna sshd[56942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.231.44.71
Dec  9 08:27:15 sauna sshd[56942]: Failed password for invalid user minecraft from 123.231.44.71 port 54834 ssh2
...
2019-12-09 20:07:42
37.187.0.223 attackbots
Dec  8 22:47:16 home sshd[9326]: Invalid user kiwan from 37.187.0.223 port 56390
Dec  8 22:47:16 home sshd[9326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.0.223
Dec  8 22:47:16 home sshd[9326]: Invalid user kiwan from 37.187.0.223 port 56390
Dec  8 22:47:17 home sshd[9326]: Failed password for invalid user kiwan from 37.187.0.223 port 56390 ssh2
Dec  8 23:01:10 home sshd[9447]: Invalid user nikiforuk from 37.187.0.223 port 41568
Dec  8 23:01:10 home sshd[9447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.0.223
Dec  8 23:01:10 home sshd[9447]: Invalid user nikiforuk from 37.187.0.223 port 41568
Dec  8 23:01:12 home sshd[9447]: Failed password for invalid user nikiforuk from 37.187.0.223 port 41568 ssh2
Dec  8 23:10:01 home sshd[9585]: Invalid user styrmoe from 37.187.0.223 port 50748
Dec  8 23:10:01 home sshd[9585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.1
2019-12-09 20:26:00
180.76.244.165 attack
Host Scan
2019-12-09 20:49:48
167.99.65.138 attackbotsspam
Dec  9 11:13:09 wh01 sshd[21612]: Invalid user server from 167.99.65.138 port 58096
Dec  9 11:13:09 wh01 sshd[21612]: Failed password for invalid user server from 167.99.65.138 port 58096 ssh2
Dec  9 11:13:09 wh01 sshd[21612]: Received disconnect from 167.99.65.138 port 58096:11: Bye Bye [preauth]
Dec  9 11:13:09 wh01 sshd[21612]: Disconnected from 167.99.65.138 port 58096 [preauth]
Dec  9 11:25:00 wh01 sshd[22496]: Invalid user nagios from 167.99.65.138 port 44154
Dec  9 11:25:00 wh01 sshd[22496]: Failed password for invalid user nagios from 167.99.65.138 port 44154 ssh2
Dec  9 11:25:00 wh01 sshd[22496]: Received disconnect from 167.99.65.138 port 44154:11: Bye Bye [preauth]
Dec  9 11:25:00 wh01 sshd[22496]: Disconnected from 167.99.65.138 port 44154 [preauth]
Dec  9 11:51:07 wh01 sshd[24957]: Invalid user michelle from 167.99.65.138 port 45884
Dec  9 11:51:07 wh01 sshd[24957]: Failed password for invalid user michelle from 167.99.65.138 port 45884 ssh2
Dec  9 11:51:07 wh01 sshd[24957
2019-12-09 20:38:07
140.143.206.137 attack
Dec  9 04:36:04 ny01 sshd[32284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.206.137
Dec  9 04:36:06 ny01 sshd[32284]: Failed password for invalid user admin from 140.143.206.137 port 33798 ssh2
Dec  9 04:42:55 ny01 sshd[563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.206.137
2019-12-09 20:41:19
185.22.187.206 attack
Dec  9 00:59:21 wbs sshd\[25314\]: Invalid user info from 185.22.187.206
Dec  9 00:59:21 wbs sshd\[25314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.22.187.206
Dec  9 00:59:24 wbs sshd\[25314\]: Failed password for invalid user info from 185.22.187.206 port 59242 ssh2
Dec  9 01:05:21 wbs sshd\[25923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.22.187.206  user=root
Dec  9 01:05:23 wbs sshd\[25923\]: Failed password for root from 185.22.187.206 port 35865 ssh2
2019-12-09 20:29:03
162.158.243.109 attack
162.158.243.109 - - [09/Dec/2019:06:26:51 +0000] "POST /wp-login.php HTTP/1.1" 200 1449 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-09 20:29:38
114.57.190.131 attackbots
Dec  9 09:53:26 server sshd\[15083\]: Invalid user admin from 114.57.190.131
Dec  9 09:53:26 server sshd\[15083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.57.190.131 
Dec  9 09:53:28 server sshd\[15083\]: Failed password for invalid user admin from 114.57.190.131 port 45684 ssh2
Dec  9 10:08:14 server sshd\[19971\]: Invalid user miner1 from 114.57.190.131
Dec  9 10:08:14 server sshd\[19971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.57.190.131 
...
2019-12-09 20:18:59

Recently Reported IPs

104.16.81.165 104.16.81.120 104.16.82.36 104.16.82.5
104.16.83.12 104.16.80.165 104.16.83.5 104.21.63.91
104.16.83.89 104.16.85.15 104.16.86.146 104.16.87.146
104.16.86.15 104.21.63.93 104.16.88.52 104.16.87.52
104.16.89.72 104.16.89.146 104.16.88.146 104.16.86.85