Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.82.82.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.82.82.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:12:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 64.82.82.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.82.82.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.56.74.27 attackspam
2019-12-24T07:18:53Z - RDP login failed multiple times. (45.56.74.27)
2019-12-24 17:19:04
120.133.1.16 attack
Dec 24 08:44:55 pornomens sshd\[981\]: Invalid user rabbitmq from 120.133.1.16 port 55438
Dec 24 08:44:55 pornomens sshd\[981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.133.1.16
Dec 24 08:44:57 pornomens sshd\[981\]: Failed password for invalid user rabbitmq from 120.133.1.16 port 55438 ssh2
...
2019-12-24 17:16:04
114.217.60.212 attack
Tue Dec 24 09:19:21 2019 \[pid 6328\] \[lexgold\] FTP response: Client "114.217.60.212", "530 Permission denied."
Tue Dec 24 09:19:23 2019 \[pid 6333\] \[lexgold\] FTP response: Client "114.217.60.212", "530 Permission denied."
Tue Dec 24 09:19:25 2019 \[pid 6340\] \[lexgold\] FTP response: Client "114.217.60.212", "530 Permission denied."
2019-12-24 17:25:53
40.107.6.134 attackspam
Spam/Phish - smtp.mailfrom=salmrr.onmicrosoft.com; dmarc=none action=none
smtp.mailfrom=salmrr.onmicrosoft.com; live.com; dkim=pass (signature wasReceived: from VE1EUR03HT073.eop-EUR03.prod.protection.outlook.com Received: from VE1EUR03FT013.eop-EUR03.prod.protection.outlook.com
2019-12-24 17:21:29
51.91.102.49 attackbotsspam
Dec 24 09:19:10 SilenceServices sshd[11133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.102.49
Dec 24 09:19:13 SilenceServices sshd[11133]: Failed password for invalid user python from 51.91.102.49 port 39012 ssh2
Dec 24 09:19:45 SilenceServices sshd[11302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.102.49
2019-12-24 17:18:28
49.150.104.157 attackbotsspam
Unauthorized connection attempt detected from IP address 49.150.104.157 to port 445
2019-12-24 17:27:23
196.61.38.138 attack
Hits on port : 445
2019-12-24 17:07:08
84.253.112.26 attackspam
firewall-block, port(s): 3389/tcp
2019-12-24 17:12:54
196.188.114.15 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-24 17:04:42
118.89.50.19 attackspambots
Automatic report - SSH Brute-Force Attack
2019-12-24 17:40:49
185.57.31.146 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-24 17:01:39
222.186.175.182 attack
2019-12-24T09:22:35.869924abusebot-5.cloudsearch.cf sshd[17208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-24T09:22:37.431706abusebot-5.cloudsearch.cf sshd[17208]: Failed password for root from 222.186.175.182 port 32860 ssh2
2019-12-24T09:22:40.611904abusebot-5.cloudsearch.cf sshd[17208]: Failed password for root from 222.186.175.182 port 32860 ssh2
2019-12-24T09:22:35.869924abusebot-5.cloudsearch.cf sshd[17208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-24T09:22:37.431706abusebot-5.cloudsearch.cf sshd[17208]: Failed password for root from 222.186.175.182 port 32860 ssh2
2019-12-24T09:22:40.611904abusebot-5.cloudsearch.cf sshd[17208]: Failed password for root from 222.186.175.182 port 32860 ssh2
2019-12-24T09:22:35.869924abusebot-5.cloudsearch.cf sshd[17208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 
...
2019-12-24 17:27:52
106.13.24.164 attackspam
Dec 24 04:15:07 firewall sshd[6689]: Invalid user idc!@#$ from 106.13.24.164
Dec 24 04:15:09 firewall sshd[6689]: Failed password for invalid user idc!@#$ from 106.13.24.164 port 44424 ssh2
Dec 24 04:19:06 firewall sshd[6797]: Invalid user gwendolyne from 106.13.24.164
...
2019-12-24 17:04:15
72.2.6.128 attack
Dec 24 08:48:49 server sshd\[7900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.2.6.128  user=daemon
Dec 24 08:48:50 server sshd\[7900\]: Failed password for daemon from 72.2.6.128 port 42280 ssh2
Dec 24 12:04:58 server sshd\[26210\]: Invalid user vesela from 72.2.6.128
Dec 24 12:04:58 server sshd\[26210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.2.6.128 
Dec 24 12:05:00 server sshd\[26210\]: Failed password for invalid user vesela from 72.2.6.128 port 43302 ssh2
...
2019-12-24 17:19:51
197.51.165.101 attackspam
Honeypot attack, port: 23, PTR: host-197.51.165.101.tedata.net.
2019-12-24 17:37:03

Recently Reported IPs

27.96.133.225 107.203.99.192 143.242.248.27 114.106.249.243
109.175.3.178 77.227.36.237 115.150.115.60 197.94.197.238
186.101.132.62 235.97.189.61 87.217.120.134 57.121.185.35
140.181.40.242 239.157.166.79 7.39.185.187 49.42.16.164
58.14.53.222 83.186.37.145 242.223.147.224 55.110.254.68