Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.197.82.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.197.82.50.			IN	A

;; AUTHORITY SECTION:
.			227	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 04:00:22 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 50.82.197.113.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.82.197.113.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.5.128.214 attack
Unauthorized connection attempt from IP address 195.5.128.214 on Port 445(SMB)
2019-07-25 14:01:57
187.253.192.166 attackspam
Unauthorized connection attempt from IP address 187.253.192.166 on Port 445(SMB)
2019-07-25 14:39:22
91.134.127.162 attackbotsspam
Jul 25 06:32:01 * sshd[27183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.127.162
Jul 25 06:32:02 * sshd[27183]: Failed password for invalid user bot from 91.134.127.162 port 56728 ssh2
2019-07-25 14:04:53
139.59.59.187 attackspambots
Invalid user support from 139.59.59.187 port 36664
2019-07-25 14:09:29
117.85.154.157 attackspam
smtp port probing
2019-07-25 14:29:07
220.191.160.42 attackbots
Jul 25 08:45:04 mail sshd\[29661\]: Failed password for invalid user ass from 220.191.160.42 port 60738 ssh2
Jul 25 08:47:22 mail sshd\[30148\]: Invalid user ftp1 from 220.191.160.42 port 57464
Jul 25 08:47:22 mail sshd\[30148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.160.42
Jul 25 08:47:24 mail sshd\[30148\]: Failed password for invalid user ftp1 from 220.191.160.42 port 57464 ssh2
Jul 25 08:49:45 mail sshd\[30498\]: Invalid user tim from 220.191.160.42 port 54224
Jul 25 08:49:45 mail sshd\[30498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.191.160.42
2019-07-25 14:51:36
14.249.15.82 attack
Unauthorized connection attempt from IP address 14.249.15.82 on Port 445(SMB)
2019-07-25 14:07:08
159.65.81.187 attackbotsspam
Invalid user admin from 159.65.81.187 port 55358
2019-07-25 14:26:45
185.211.129.196 attack
Unauthorized connection attempt from IP address 185.211.129.196 on Port 445(SMB)
2019-07-25 14:18:41
14.162.120.30 attackspambots
Unauthorized connection attempt from IP address 14.162.120.30 on Port 445(SMB)
2019-07-25 14:22:49
61.220.204.182 attackspam
Unauthorized connection attempt from IP address 61.220.204.182 on Port 445(SMB)
2019-07-25 14:11:43
183.82.49.10 attackbots
Unauthorized connection attempt from IP address 183.82.49.10 on Port 445(SMB)
2019-07-25 14:45:43
200.80.130.106 attackspam
Invalid user test from 200.80.130.106 port 34143
2019-07-25 14:33:10
178.124.162.94 attackbots
Unauthorized connection attempt from IP address 178.124.162.94 on Port 445(SMB)
2019-07-25 14:04:24
114.216.117.189 attackspam
[2019/7/25 AM 05:44:59] [1240] 114.216.117.189 Could not find this mailbox or has been disabled: bbbb@xxxxxx.com.tw
2019-07-25 14:32:13

Recently Reported IPs

113.2.212.210 113.196.235.206 113.2.205.202 113.2.103.163
113.2.239.183 113.2.139.58 113.199.93.250 113.199.24.205
113.198.81.3 113.2.110.95 113.2.151.58 113.2.223.157
113.198.196.204 113.2.214.234 113.2.62.65 113.198.38.118
113.2.134.164 113.2.165.154 113.2.142.135 113.198.222.74