Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: New Zealand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.216.164.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.216.164.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 03:32:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
82.164.216.130.in-addr.arpa domain name pointer cpd164-82.cpd.auckland.ac.nz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.164.216.130.in-addr.arpa	name = cpd164-82.cpd.auckland.ac.nz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
50.209.71.165 attack
Aug  4 12:41:08 tuotantolaitos sshd[2495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.209.71.165
Aug  4 12:41:10 tuotantolaitos sshd[2495]: Failed password for invalid user developer from 50.209.71.165 port 24366 ssh2
...
2019-08-04 17:49:14
58.221.91.74 attackspam
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: Invalid user deploy from 58.221.91.74
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.91.74 
Aug  4 12:47:27 lcl-usvr-01 sshd[15382]: Invalid user deploy from 58.221.91.74
Aug  4 12:47:30 lcl-usvr-01 sshd[15382]: Failed password for invalid user deploy from 58.221.91.74 port 49380 ssh2
Aug  4 12:52:11 lcl-usvr-01 sshd[16643]: Invalid user cumulus from 58.221.91.74
2019-08-04 18:08:21
31.40.128.65 attackbotsspam
[portscan] Port scan
2019-08-04 17:21:17
202.51.98.131 attack
Aug  4 03:13:07 ncomp sshd[18066]: Invalid user lrios from 202.51.98.131
Aug  4 03:13:07 ncomp sshd[18066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.98.131
Aug  4 03:13:07 ncomp sshd[18066]: Invalid user lrios from 202.51.98.131
Aug  4 03:13:09 ncomp sshd[18066]: Failed password for invalid user lrios from 202.51.98.131 port 35367 ssh2
2019-08-04 18:19:04
222.218.17.80 attackbots
IMAP brute force
...
2019-08-04 18:21:09
35.190.193.42 attack
port scan and connect, tcp 22 (ssh)
2019-08-04 18:14:57
138.0.7.214 attack
Aug  4 02:40:54 host sshd\[33321\]: Invalid user admin from 138.0.7.214 port 53117
Aug  4 02:40:58 host sshd\[33321\]: Failed password for invalid user admin from 138.0.7.214 port 53117 ssh2
...
2019-08-04 17:19:37
202.45.147.118 attack
Invalid user laura from 202.45.147.118 port 47082
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.118
Failed password for invalid user laura from 202.45.147.118 port 47082 ssh2
Invalid user valhalla from 202.45.147.118 port 44459
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.45.147.118
2019-08-04 17:20:22
43.242.215.70 attack
Automatic report
2019-08-04 18:10:01
92.119.160.52 attack
Sun 04 04:52:49 39698/tcp
Sun 04 05:31:27 54083/tcp
Sun 04 05:36:43 50760/tcp
2019-08-04 18:16:11
80.210.22.187 attackbotsspam
Automatic report - Port Scan Attack
2019-08-04 18:07:42
104.248.150.23 attack
Aug  4 12:19:28 intra sshd\[10373\]: Invalid user vs from 104.248.150.23Aug  4 12:19:30 intra sshd\[10373\]: Failed password for invalid user vs from 104.248.150.23 port 51628 ssh2Aug  4 12:24:23 intra sshd\[10443\]: Invalid user irina from 104.248.150.23Aug  4 12:24:25 intra sshd\[10443\]: Failed password for invalid user irina from 104.248.150.23 port 46324 ssh2Aug  4 12:29:20 intra sshd\[10507\]: Invalid user maria from 104.248.150.23Aug  4 12:29:22 intra sshd\[10507\]: Failed password for invalid user maria from 104.248.150.23 port 40768 ssh2
...
2019-08-04 17:45:38
128.199.255.146 attackbots
Invalid user ftpuser from 128.199.255.146 port 38962
2019-08-04 17:23:20
14.102.17.34 attackspambots
Aug  4 09:15:12 localhost sshd\[43043\]: Invalid user beavis from 14.102.17.34 port 53707
Aug  4 09:15:12 localhost sshd\[43043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.17.34
Aug  4 09:15:13 localhost sshd\[43043\]: Failed password for invalid user beavis from 14.102.17.34 port 53707 ssh2
Aug  4 09:20:50 localhost sshd\[43211\]: Invalid user mcserver from 14.102.17.34 port 48800
Aug  4 09:20:50 localhost sshd\[43211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.17.34
...
2019-08-04 17:28:18
42.112.17.30 attack
RDP_Brute_Force
2019-08-04 18:21:43

Recently Reported IPs

211.10.40.220 243.10.83.82 152.176.145.196 160.54.7.75
17.189.204.92 137.209.60.80 150.134.149.137 137.67.246.193
124.151.141.156 41.166.131.247 154.157.174.58 154.165.225.100
153.226.153.79 154.209.64.29 136.15.220.94 177.254.193.33
119.150.57.235 246.69.101.215 117.83.79.148 18.81.203.66