Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 130.241.16.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;130.241.16.82.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 23:00:13 CST 2025
;; MSG SIZE  rcvd: 106
Host info
82.16.241.130.in-addr.arpa domain name pointer ub016082.ub.gu.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.16.241.130.in-addr.arpa	name = ub016082.ub.gu.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.201.239 attack
" "
2019-10-23 20:45:20
80.82.70.239 attackbotsspam
10/23/2019-08:16:37.702120 80.82.70.239 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 82
2019-10-23 20:19:36
95.188.70.119 attackspam
Oct 23 15:27:26 server sshd\[631\]: Invalid user dvcs from 95.188.70.119 port 57470
Oct 23 15:27:26 server sshd\[631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.188.70.119
Oct 23 15:27:29 server sshd\[631\]: Failed password for invalid user dvcs from 95.188.70.119 port 57470 ssh2
Oct 23 15:31:19 server sshd\[7101\]: User root from 95.188.70.119 not allowed because listed in DenyUsers
Oct 23 15:31:19 server sshd\[7101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.188.70.119  user=root
2019-10-23 20:36:48
220.135.101.187 attackbotsspam
Port Scan
2019-10-23 20:28:56
187.216.251.182 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:44:21
35.224.55.123 attackbots
fail2ban honeypot
2019-10-23 20:25:56
52.221.24.54 attackbots
Automatic report - XMLRPC Attack
2019-10-23 20:44:49
150.109.52.25 attackspam
Oct 23 14:19:45 legacy sshd[30513]: Failed password for root from 150.109.52.25 port 47042 ssh2
Oct 23 14:24:04 legacy sshd[30640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.52.25
Oct 23 14:24:06 legacy sshd[30640]: Failed password for invalid user ubnt from 150.109.52.25 port 57926 ssh2
...
2019-10-23 20:35:52
186.122.39.205 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-23 20:23:56
222.175.126.74 attackbotsspam
Oct 23 14:25:19 minden010 sshd[22925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.175.126.74
Oct 23 14:25:21 minden010 sshd[22925]: Failed password for invalid user inf0 from 222.175.126.74 port 21880 ssh2
Oct 23 14:30:20 minden010 sshd[28769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.175.126.74
...
2019-10-23 20:36:08
82.200.232.150 attack
[2019/10/23 下午 07:44:51] [1556] SMTP 服務接受從 82.200.232.150 來的連線
[2019/10/23 下午 07:45:01] [1556] SMTP 服務拒絕從 82.200.232.150 (82.*.*.*) 來的連線
2019-10-23 20:15:27
109.104.105.115 attack
Portscan or hack attempt detected by psad/fwsnort
2019-10-23 20:41:38
59.126.235.112 attackspam
Port Scan
2019-10-23 20:24:48
189.254.33.157 attackbots
Invalid user usuario from 189.254.33.157 port 51975
2019-10-23 20:55:16
172.96.10.19 attackspam
smtp brute-force attack, slow rate mode
2019-10-23 20:46:32

Recently Reported IPs

138.89.53.55 124.118.120.246 14.54.133.48 15.244.231.198
128.195.119.69 114.217.241.125 116.193.255.96 34.125.60.50
135.73.39.134 153.175.199.139 90.139.70.125 205.204.155.211
92.61.74.27 249.85.4.248 159.229.73.82 164.193.140.107
53.128.41.54 120.228.143.95 45.218.119.237 125.101.248.155