Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kansas City

Region: Missouri

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: DataShack, LC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.54.179.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45852
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.54.179.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 22:46:34 +08 2019
;; MSG SIZE  rcvd: 117

Host info
82.179.54.142.in-addr.arpa domain name pointer vps22.whentoread.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
82.179.54.142.in-addr.arpa	name = vps22.whentoread.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
118.71.31.234 attackspam
Dec 11 13:31:03 debian-2gb-nbg1-2 kernel: \[24349007.911300\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=118.71.31.234 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=50 ID=59744 PROTO=TCP SPT=48639 DPT=23 WINDOW=35791 RES=0x00 SYN URGP=0
2019-12-11 20:38:07
182.150.28.144 attackbotsspam
Dec 10 23:08:07 kapalua sshd\[12704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.28.144  user=root
Dec 10 23:08:10 kapalua sshd\[12704\]: Failed password for root from 182.150.28.144 port 44417 ssh2
Dec 10 23:15:16 kapalua sshd\[13575\]: Invalid user faucher from 182.150.28.144
Dec 10 23:15:16 kapalua sshd\[13575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.28.144
Dec 10 23:15:18 kapalua sshd\[13575\]: Failed password for invalid user faucher from 182.150.28.144 port 44481 ssh2
2019-12-11 20:07:12
178.128.107.61 attackspam
2019-12-11T12:13:05.794809abusebot-5.cloudsearch.cf sshd\[24068\]: Invalid user robert from 178.128.107.61 port 38368
2019-12-11 20:28:09
88.119.196.11 attackspam
Unauthorized connection attempt detected from IP address 88.119.196.11 to port 445
2019-12-11 20:49:42
190.37.192.245 attackbotsspam
SIP/5060 Probe, BF, Hack -
2019-12-11 20:08:56
185.156.73.49 attack
ET DROP Dshield Block Listed Source group 1 - port: 32778 proto: TCP cat: Misc Attack
2019-12-11 20:20:39
223.205.218.217 attackspam
Unauthorized connection attempt detected from IP address 223.205.218.217 to port 445
2019-12-11 20:38:30
45.253.64.83 attack
firewall-block, port(s): 3388/tcp
2019-12-11 20:30:14
198.245.63.94 attack
SSH bruteforce (Triggered fail2ban)
2019-12-11 20:23:45
89.248.168.217 attackbotsspam
89.248.168.217 was recorded 51 times by 31 hosts attempting to connect to the following ports: 1035,1031,1046. Incident counter (4h, 24h, all-time): 51, 285, 10693
2019-12-11 20:22:45
182.68.59.215 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-12-2019 06:25:19.
2019-12-11 20:40:33
171.213.12.251 attackbotsspam
2019-12-10 UTC: 2x - phion(2x)
2019-12-11 20:35:09
189.210.118.150 attackspambots
Honeypot attack, port: 23, PTR: 189-210-118-150.static.axtel.net.
2019-12-11 20:27:52
106.54.141.196 attackspam
Dec 11 15:41:36 gw1 sshd[18717]: Failed password for uucp from 106.54.141.196 port 40398 ssh2
...
2019-12-11 20:25:56
1.4.198.252 attackbotsspam
Honeypot attack, port: 445, PTR: node-e0s.pool-1-4.dynamic.totinternet.net.
2019-12-11 20:16:13

Recently Reported IPs

222.117.115.175 192.200.215.42 197.60.102.207 190.216.198.146
127.30.193.117 61.243.164.1 104.223.40.2 195.231.8.214
79.254.218.240 125.137.76.150 122.86.15.172 78.63.108.93
185.44.11.42 181.144.183.211 141.28.79.252 189.212.56.111
125.4.77.24 216.243.178.199 95.110.159.163 162.112.78.79