Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.42.105.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5047
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;165.42.105.82.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 16 04:37:36 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 82.105.42.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 82.105.42.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.81.112.223 attackspambots
Attempted connection to port 80.
2020-04-24 01:11:13
130.204.22.235 attackbotsspam
Attempted connection to port 445.
2020-04-24 01:19:02
124.78.77.174 attackbots
Attempted connection to port 445.
2020-04-24 01:19:42
190.74.230.249 attack
Unauthorized connection attempt from IP address 190.74.230.249 on Port 445(SMB)
2020-04-24 00:48:14
37.228.137.244 attackspam
Attempted connection to port 24296.
2020-04-24 01:13:57
196.37.111.217 attack
Apr 23 10:01:22 mockhub sshd[28243]: Failed password for root from 196.37.111.217 port 54848 ssh2
...
2020-04-24 01:12:39
39.62.171.55 attackspambots
Attempted connection to port 445.
2020-04-24 01:11:31
190.39.138.109 attackspambots
20/4/23@04:31:24: FAIL: Alarm-Network address from=190.39.138.109
...
2020-04-24 00:43:49
159.89.207.146 attackbotsspam
2020-04-23T18:32:59.849184ns386461 sshd\[17138\]: Invalid user admin from 159.89.207.146 port 57418
2020-04-23T18:32:59.853508ns386461 sshd\[17138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.207.146
2020-04-23T18:33:01.972002ns386461 sshd\[17138\]: Failed password for invalid user admin from 159.89.207.146 port 57418 ssh2
2020-04-23T18:45:56.773270ns386461 sshd\[28585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.207.146  user=root
2020-04-23T18:45:58.561053ns386461 sshd\[28585\]: Failed password for root from 159.89.207.146 port 59142 ssh2
...
2020-04-24 00:49:42
222.186.173.183 attackspam
Apr 23 19:04:32 server sshd[3530]: Failed none for root from 222.186.173.183 port 63490 ssh2
Apr 23 19:04:35 server sshd[3530]: Failed password for root from 222.186.173.183 port 63490 ssh2
Apr 23 19:04:38 server sshd[3530]: Failed password for root from 222.186.173.183 port 63490 ssh2
2020-04-24 01:17:54
14.239.194.100 attackbots
Unauthorized connection attempt from IP address 14.239.194.100 on Port 445(SMB)
2020-04-24 00:57:51
141.98.81.108 attackbots
Apr 23 16:45:43 *** sshd[19802]: Invalid user admin from 141.98.81.108
2020-04-24 01:06:55
117.4.33.189 attack
Honeypot attack, port: 81, PTR: localhost.
2020-04-24 01:16:37
187.12.198.90 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-24 00:45:58
110.77.148.247 attack
Unauthorized connection attempt from IP address 110.77.148.247 on Port 445(SMB)
2020-04-24 00:53:46

Recently Reported IPs

238.241.234.191 215.69.51.221 200.234.111.126 32.121.236.137
216.102.81.27 1.163.208.129 132.113.91.144 195.2.24.62
61.154.207.112 183.6.179.2 24.166.35.98 185.40.41.28
77.85.134.223 124.114.235.37 120.84.49.21 60.11.43.111
129.137.82.7 203.125.199.79 182.75.145.22 119.51.190.196