Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.20.219.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1475
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.20.219.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:47:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.219.20.164.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.219.20.164.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.25.64.61 attack
Port Scan: UDP/49153
2019-09-10 19:05:41
63.226.39.153 attack
Port Scan: UDP/137
2019-09-10 18:49:21
200.100.37.179 attackbotsspam
Port Scan: TCP/8080
2019-09-10 18:03:38
31.13.176.209 attackbotsspam
19/9/9@22:23:44: FAIL: Alarm-Intrusion address from=31.13.176.209
...
2019-09-10 18:52:51
64.90.3.202 attackspambots
Port Scan: UDP/137
2019-09-10 19:13:13
196.52.43.97 attackspam
Port Scan: TCP/3052
2019-09-10 18:05:57
86.105.25.66 attackbots
Port Scan: TCP/10003
2019-09-10 19:28:57
190.88.136.8 attackspam
Port Scan: TCP/5555
2019-09-10 19:20:52
126.51.151.12 attackspambots
Port Scan: TCP/8080
2019-09-10 19:24:58
63.245.58.173 attackspam
Port Scan: UDP/1234
2019-09-10 19:13:33
211.220.27.191 attackbotsspam
F2B jail: sshd. Time: 2019-09-10 13:31:00, Reported by: VKReport
2019-09-10 19:33:42
209.235.67.49 attackspambots
Sep 10 01:25:23 eddieflores sshd\[9146\]: Invalid user test2 from 209.235.67.49
Sep 10 01:25:23 eddieflores sshd\[9146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
Sep 10 01:25:25 eddieflores sshd\[9146\]: Failed password for invalid user test2 from 209.235.67.49 port 49461 ssh2
Sep 10 01:30:47 eddieflores sshd\[9611\]: Invalid user tester from 209.235.67.49
Sep 10 01:30:47 eddieflores sshd\[9611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.235.67.49
2019-09-10 19:32:27
200.26.194.161 attackspambots
Port Scan: UDP/137
2019-09-10 19:19:38
221.234.231.141 attackspambots
Port Scan: UDP/49153
2019-09-10 18:02:23
197.51.129.126 attackbotsspam
Port Scan: TCP/23
2019-09-10 19:20:03

Recently Reported IPs

87.190.223.7 37.11.228.113 204.70.231.126 20.160.27.5
186.167.20.145 6.178.120.195 133.166.84.155 110.47.61.165
208.244.102.11 246.235.227.100 89.222.251.153 37.94.249.166
190.98.179.30 164.47.123.62 39.125.165.84 78.133.6.215
49.162.139.62 185.12.149.40 227.71.55.70 160.11.185.91