Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.161.9.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61715
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.161.9.82.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 12:23:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
82.9.161.131.in-addr.arpa domain name pointer dynamic-131-161-9-82.gptelecomprovedor.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.9.161.131.in-addr.arpa	name = dynamic-131-161-9-82.gptelecomprovedor.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.71.167.163 attackspambots
Dec 30 19:06:05 h2177944 kernel: \[927827.578263\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.163 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=115 ID=55733 PROTO=TCP SPT=24100 DPT=8334 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 30 19:06:05 h2177944 kernel: \[927827.578279\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.163 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=115 ID=55733 PROTO=TCP SPT=24100 DPT=8334 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 30 19:21:25 h2177944 kernel: \[928747.473209\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.163 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=113 ID=4815 PROTO=TCP SPT=18530 DPT=2049 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 30 19:21:25 h2177944 kernel: \[928747.473221\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.163 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=113 ID=4815 PROTO=TCP SPT=18530 DPT=2049 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 30 19:34:04 h2177944 kernel: \[929506.406016\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.163 DST=85.214.117
2019-12-31 02:50:29
218.73.96.169 attack
Unauthorized connection attempt detected from IP address 218.73.96.169 to port 445
2019-12-31 02:53:13
1.53.68.149 attackbotsspam
Unauthorized connection attempt detected from IP address 1.53.68.149 to port 23
2019-12-31 02:49:27
117.50.6.201 attackbotsspam
Unauthorized connection attempt detected from IP address 117.50.6.201 to port 993
2019-12-31 03:06:12
115.208.159.230 attack
Unauthorized connection attempt detected from IP address 115.208.159.230 to port 1433
2019-12-31 03:07:03
210.116.246.141 attack
Unauthorized connection attempt detected from IP address 210.116.246.141 to port 8080
2019-12-31 02:53:44
182.254.228.154 attackspam
Unauthorized connection attempt detected from IP address 182.254.228.154 to port 1433
2019-12-31 02:55:36
1.53.224.77 attackspambots
Unauthorized connection attempt detected from IP address 1.53.224.77 to port 23
2019-12-31 02:48:58
171.7.87.71 attack
Unauthorized connection attempt detected from IP address 171.7.87.71 to port 9000
2019-12-31 02:56:58
185.156.177.233 attack
Unauthorized connection attempt detected from IP address 185.156.177.233 to port 10096
2019-12-31 02:54:17
118.128.116.9 attackbotsspam
Unauthorized connection attempt detected from IP address 118.128.116.9 to port 9001
2019-12-31 02:32:40
14.116.207.212 attackbots
Unauthorized connection attempt detected from IP address 14.116.207.212 to port 445
2019-12-31 02:47:06
222.79.8.91 attackbotsspam
Unauthorized connection attempt detected from IP address 222.79.8.91 to port 1433
2019-12-31 02:51:16
115.61.125.51 attackbotsspam
Unauthorized connection attempt detected from IP address 115.61.125.51 to port 23
2019-12-31 03:07:15
220.194.64.148 attackspam
Unauthorized connection attempt detected from IP address 220.194.64.148 to port 2323
2019-12-31 02:51:28

Recently Reported IPs

131.161.9.72 49.86.177.15 45.57.255.151 45.57.255.168
45.58.13.146 45.60.12.27 45.62.189.135 45.62.224.21
3.88.12.111 45.63.60.101 45.63.60.164 45.63.75.6
45.4.117.38 45.63.101.85 45.70.106.180 45.57.255.149
45.58.59.77 45.59.221.46 131.161.8.12 131.161.8.240