Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kakogawa

Region: Hyōgo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.82.249.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4947
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;116.82.249.215.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061900 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 20 01:48:47 CST 2019
;; MSG SIZE  rcvd: 118
Host info
215.249.82.116.in-addr.arpa domain name pointer ntkngw649215.kngw.nt.ngn.ppp.infoweb.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
215.249.82.116.in-addr.arpa	name = ntkngw649215.kngw.nt.ngn.ppp.infoweb.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.18.118.208 attack
Unauthorised access (Nov  1) SRC=125.18.118.208 LEN=52 TTL=117 ID=13282 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov  1) SRC=125.18.118.208 LEN=52 TTL=117 ID=27502 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov  1) SRC=125.18.118.208 LEN=52 TTL=117 ID=17564 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov  1) SRC=125.18.118.208 LEN=52 TTL=115 ID=13118 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 31) SRC=125.18.118.208 LEN=52 TTL=117 ID=14540 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=125.18.118.208 LEN=52 TTL=114 ID=25592 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=125.18.118.208 LEN=52 TTL=117 ID=31931 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=125.18.118.208 LEN=52 TTL=117 ID=14626 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 27) SRC=125.18.118.208 LEN=52 TTL=116 ID=10962 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-02 07:25:55
116.132.79.58 attackbots
Automatic report - Port Scan Attack
2019-11-02 07:24:42
51.68.71.129 attackspam
Automatic report - XMLRPC Attack
2019-11-02 07:30:31
106.13.29.29 attack
Oct 31 09:47:54 xxxxxxx0 sshd[10107]: Invalid user support from 106.13.29.29 port 60646
Oct 31 09:47:54 xxxxxxx0 sshd[10107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29
Oct 31 09:47:56 xxxxxxx0 sshd[10107]: Failed password for invalid user support from 106.13.29.29 port 60646 ssh2
Oct 31 10:12:49 xxxxxxx0 sshd[14491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.29.29  user=r.r
Oct 31 10:12:51 xxxxxxx0 sshd[14491]: Failed password for r.r from 106.13.29.29 port 56570 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.29.29
2019-11-02 07:25:03
157.245.81.255 attackbotsspam
2019-11-01T20:12:25Z - RDP login failed multiple times. (157.245.81.255)
2019-11-02 07:33:38
175.143.86.109 attack
8728/tcp 22/tcp 8291/tcp...
[2019-11-01]5pkt,3pt.(tcp)
2019-11-02 07:40:46
49.235.99.45 attackspambots
ssh failed login
2019-11-02 07:46:11
138.122.202.200 attack
Nov  1 13:40:57 eddieflores sshd\[16445\]: Invalid user support from 138.122.202.200
Nov  1 13:40:57 eddieflores sshd\[16445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200
Nov  1 13:40:59 eddieflores sshd\[16445\]: Failed password for invalid user support from 138.122.202.200 port 55758 ssh2
Nov  1 13:45:26 eddieflores sshd\[17321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.122.202.200  user=root
Nov  1 13:45:29 eddieflores sshd\[17321\]: Failed password for root from 138.122.202.200 port 38718 ssh2
2019-11-02 07:56:23
211.169.249.156 attackspam
2019-11-02T00:27:57.833072scmdmz1 sshd\[18960\]: Invalid user 123456 from 211.169.249.156 port 55170
2019-11-02T00:27:57.836126scmdmz1 sshd\[18960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.169.249.156
2019-11-02T00:27:59.571667scmdmz1 sshd\[18960\]: Failed password for invalid user 123456 from 211.169.249.156 port 55170 ssh2
...
2019-11-02 07:55:56
61.223.238.243 attack
23/tcp
[2019-11-01]1pkt
2019-11-02 07:31:37
218.148.239.169 attack
2019-11-01T20:12:03.221052abusebot-5.cloudsearch.cf sshd\[15647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.148.239.169  user=root
2019-11-02 07:50:15
103.129.98.170 attackspam
Oct 31 13:25:16 eola sshd[25588]: Invalid user virusalert from 103.129.98.170 port 36574
Oct 31 13:25:16 eola sshd[25588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.98.170 
Oct 31 13:25:18 eola sshd[25588]: Failed password for invalid user virusalert from 103.129.98.170 port 36574 ssh2
Oct 31 13:25:18 eola sshd[25588]: Received disconnect from 103.129.98.170 port 36574:11: Bye Bye [preauth]
Oct 31 13:25:18 eola sshd[25588]: Disconnected from 103.129.98.170 port 36574 [preauth]
Oct 31 13:35:37 eola sshd[25993]: Invalid user ansible from 103.129.98.170 port 44728
Oct 31 13:35:37 eola sshd[25993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.98.170 
Oct 31 13:35:39 eola sshd[25993]: Failed password for invalid user ansible from 103.129.98.170 port 44728 ssh2
Oct 31 13:35:39 eola sshd[25993]: Received disconnect from 103.129.98.170 port 44728:11: Bye Bye [preauth]
Oct 31........
-------------------------------
2019-11-02 07:44:33
182.253.188.11 attack
F2B jail: sshd. Time: 2019-11-02 00:25:11, Reported by: VKReport
2019-11-02 07:27:36
58.43.242.196 attackspam
445/tcp
[2019-11-01]1pkt
2019-11-02 07:26:25
195.97.21.196 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/195.97.21.196/ 
 
 GR - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GR 
 NAME ASN : ASN3329 
 
 IP : 195.97.21.196 
 
 CIDR : 195.97.0.0/19 
 
 PREFIX COUNT : 167 
 
 UNIQUE IP COUNT : 788480 
 
 
 ATTACKS DETECTED ASN3329 :  
  1H - 3 
  3H - 7 
  6H - 11 
 12H - 16 
 24H - 28 
 
 DateTime : 2019-11-01 21:11:50 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-02 07:58:14

Recently Reported IPs

190.46.108.83 180.126.235.158 206.189.200.22 86.22.96.91
94.240.46.82 165.95.50.141 141.216.66.227 113.148.164.145
118.67.177.205 168.25.162.99 103.89.90.69 54.38.184.10
152.195.117.133 191.53.223.7 110.32.161.189 124.74.248.218
113.53.29.4 176.212.163.110 126.147.67.140 131.72.127.145