Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Thiruvananthapuram

Region: Kerala

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: Reliance Jio Infocomm Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.97.54.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27285
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;137.97.54.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 01:41:59 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 82.54.97.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 82.54.97.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.66.3.92 attackspam
Aug  8 18:04:54 rush sshd[27900]: Failed password for root from 190.66.3.92 port 32886 ssh2
Aug  8 18:07:23 rush sshd[27976]: Failed password for root from 190.66.3.92 port 51116 ssh2
...
2020-08-09 04:16:40
198.100.146.67 attackbots
SSH invalid-user multiple login attempts
2020-08-09 04:38:25
101.93.102.45 attackbots
Aug  9 03:24:43 webhost01 sshd[18673]: Failed password for root from 101.93.102.45 port 51933 ssh2
...
2020-08-09 04:32:27
192.99.5.228 attackspam
Excessive crawling : exceed crawl-delay defined in robots.txt
2020-08-09 04:35:02
164.160.33.164 attackspam
2020-08-08T12:05:23.455848hostname sshd[23755]: Failed password for root from 164.160.33.164 port 33580 ssh2
...
2020-08-09 04:23:26
13.229.168.91 spambotsattackproxynormal
username and password
2020-08-09 04:33:39
193.112.100.92 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-09 04:13:35
112.85.42.200 attackspambots
Aug  8 22:11:17 * sshd[17212]: Failed password for root from 112.85.42.200 port 61162 ssh2
Aug  8 22:11:27 * sshd[17212]: Failed password for root from 112.85.42.200 port 61162 ssh2
2020-08-09 04:16:17
198.27.90.106 attackspambots
Aug  8 20:36:07 django-0 sshd[7037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106  user=root
Aug  8 20:36:09 django-0 sshd[7037]: Failed password for root from 198.27.90.106 port 59092 ssh2
...
2020-08-09 04:37:16
14.51.232.216 attackbots
2020-08-08T15:28:39.311154morrigan.ad5gb.com sshd[431182]: Failed password for root from 14.51.232.216 port 26897 ssh2
2020-08-08T15:28:39.994798morrigan.ad5gb.com sshd[431182]: Disconnected from authenticating user root 14.51.232.216 port 26897 [preauth]
2020-08-09 04:45:40
112.85.42.188 attackbots
08/08/2020-16:46:20.203623 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-08-09 04:48:52
46.21.249.141 attackbotsspam
Aug  8 22:16:01 plg sshd[2759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.21.249.141  user=root
Aug  8 22:16:02 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:05 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:08 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:11 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:13 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:16 plg sshd[2759]: Failed password for invalid user root from 46.21.249.141 port 57164 ssh2
Aug  8 22:16:16 plg sshd[2759]: error: maximum authentication attempts exceeded for invalid user root from 46.21.249.141 port 57164 ssh2 [preauth]
...
2020-08-09 04:18:13
45.56.66.47 attackbotsspam
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-09 04:34:29
192.240.123.49 attack
Aug 7 00:17:56 *hidden* sshd[27587]: Failed password for *hidden* from 192.240.123.49 port 45433 ssh2 Aug 7 00:31:21 *hidden* sshd[32177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.240.123.49 user=root Aug 7 00:31:24 *hidden* sshd[32177]: Failed password for *hidden* from 192.240.123.49 port 57534 ssh2
2020-08-09 04:14:23
183.103.115.2 attackbots
Automatic report - Banned IP Access
2020-08-09 04:22:06

Recently Reported IPs

98.126.176.14 207.242.45.207 50.254.43.221 112.141.99.240
35.14.186.135 31.234.172.117 105.227.75.107 39.202.130.46
148.126.254.185 159.89.192.147 38.47.71.239 133.131.253.69
112.219.62.212 182.73.194.130 102.63.30.37 90.27.199.56
45.160.90.221 187.53.20.107 110.109.106.95 171.81.230.44