Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.239.82.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.239.82.72.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:23:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
72.82.239.117.in-addr.arpa domain name pointer vmcegov.org.
72.82.239.117.in-addr.arpa domain name pointer vmcgujarat.com.
72.82.239.117.in-addr.arpa domain name pointer vmcgujarat.org.
72.82.239.117.in-addr.arpa domain name pointer vmc.gov.in.
72.82.239.117.in-addr.arpa domain name pointer vmcegov.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.82.239.117.in-addr.arpa	name = vmc.gov.in.
72.82.239.117.in-addr.arpa	name = vmcegov.com.
72.82.239.117.in-addr.arpa	name = vmcegov.org.
72.82.239.117.in-addr.arpa	name = vmcgujarat.com.
72.82.239.117.in-addr.arpa	name = vmcgujarat.org.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.175.151.123 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-04-04 04:39:41
138.68.231.231 attackbotsspam
Apr  3 15:36:40 vpn01 sshd[14417]: Failed password for root from 138.68.231.231 port 36040 ssh2
...
2020-04-04 04:38:38
106.124.131.214 attackspam
fail2ban
2020-04-04 04:52:28
120.132.22.92 attackspam
Invalid user monroe from 120.132.22.92 port 53412
2020-04-04 04:43:22
106.13.54.106 attackspambots
Apr  3 22:53:01 host01 sshd[10493]: Failed password for root from 106.13.54.106 port 24213 ssh2
Apr  3 22:55:18 host01 sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.54.106 
Apr  3 22:55:20 host01 sshd[10922]: Failed password for invalid user user from 106.13.54.106 port 63033 ssh2
...
2020-04-04 04:56:25
138.197.5.191 attackbots
[ssh] SSH attack
2020-04-04 04:37:59
167.172.145.142 attack
Apr  3 22:05:45 ArkNodeAT sshd\[6250\]: Invalid user renhongkai from 167.172.145.142
Apr  3 22:05:45 ArkNodeAT sshd\[6250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.145.142
Apr  3 22:05:47 ArkNodeAT sshd\[6250\]: Failed password for invalid user renhongkai from 167.172.145.142 port 54956 ssh2
2020-04-04 04:34:22
118.25.126.40 attackspambots
Invalid user qp from 118.25.126.40 port 38888
2020-04-04 04:45:53
51.254.143.190 attackbotsspam
Apr  3 22:37:21 ewelt sshd[8042]: Invalid user test from 51.254.143.190 port 42630
Apr  3 22:37:21 ewelt sshd[8042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.143.190
Apr  3 22:37:21 ewelt sshd[8042]: Invalid user test from 51.254.143.190 port 42630
Apr  3 22:37:23 ewelt sshd[8042]: Failed password for invalid user test from 51.254.143.190 port 42630 ssh2
...
2020-04-04 05:09:36
112.30.210.140 attack
$f2bV_matches
2020-04-04 04:48:13
103.72.144.228 attackbots
(sshd) Failed SSH login from 103.72.144.228 (HK/Hong Kong/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 20:40:07 ubnt-55d23 sshd[7007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.72.144.228  user=root
Apr  3 20:40:09 ubnt-55d23 sshd[7007]: Failed password for root from 103.72.144.228 port 42914 ssh2
2020-04-04 04:59:08
85.172.38.232 attackbots
SSH Brute Force
2020-04-04 05:03:33
51.89.68.141 attack
Apr  3 23:01:41 server sshd[22426]: Failed password for root from 51.89.68.141 port 36050 ssh2
Apr  3 23:05:11 server sshd[23458]: Failed password for root from 51.89.68.141 port 46872 ssh2
Apr  3 23:08:29 server sshd[24340]: Failed password for invalid user admin from 51.89.68.141 port 56334 ssh2
2020-04-04 05:10:22
114.67.95.121 attack
Invalid user lijinming from 114.67.95.121 port 34362
2020-04-04 04:47:02
109.194.174.78 attack
Invalid user liyj from 109.194.174.78 port 58143
2020-04-04 04:50:35

Recently Reported IPs

117.239.78.203 117.239.89.130 117.24.219.229 117.24.39.176
117.24.39.85 117.240.114.212 117.24.35.147 117.240.53.66
117.240.217.51 117.24.60.27 117.240.63.170 117.241.168.135
117.241.170.87 117.241.112.60 117.241.182.56 117.241.45.200
117.241.183.2 117.242.121.52 117.242.145.251 117.242.136.99