Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Manhattan

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.82.205.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.82.205.129.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020200 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 02 14:31:00 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 129.205.82.169.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.205.82.169.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.75.205.116 attack
Fail2Ban - FTP Abuse Attempt
2019-11-01 02:32:32
134.175.46.166 attack
2019-10-31T15:08:35.296265shield sshd\[8127\]: Invalid user finik from 134.175.46.166 port 57302
2019-10-31T15:08:35.300584shield sshd\[8127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.46.166
2019-10-31T15:08:37.226110shield sshd\[8127\]: Failed password for invalid user finik from 134.175.46.166 port 57302 ssh2
2019-10-31T15:14:56.088125shield sshd\[9582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.46.166  user=root
2019-10-31T15:14:58.319633shield sshd\[9582\]: Failed password for root from 134.175.46.166 port 40088 ssh2
2019-11-01 02:21:51
101.6.64.157 attack
Unauthorized connection attempt from IP address 101.6.64.157 on Port 445(SMB)
2019-11-01 02:34:04
36.67.135.42 attack
Oct 31 14:26:18 legacy sshd[16450]: Failed password for nobody from 36.67.135.42 port 60080 ssh2
Oct 31 14:31:30 legacy sshd[16610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.135.42
Oct 31 14:31:32 legacy sshd[16610]: Failed password for invalid user melquior from 36.67.135.42 port 51675 ssh2
...
2019-11-01 02:13:01
36.226.236.145 attackspambots
Unauthorized connection attempt from IP address 36.226.236.145 on Port 445(SMB)
2019-11-01 02:05:39
122.160.97.183 attack
Unauthorized connection attempt from IP address 122.160.97.183 on Port 445(SMB)
2019-11-01 02:23:33
139.59.78.236 attackspam
Oct 31 14:47:52 sshgateway sshd\[11899\]: Invalid user mysql from 139.59.78.236
Oct 31 14:47:52 sshgateway sshd\[11899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.78.236
Oct 31 14:47:54 sshgateway sshd\[11899\]: Failed password for invalid user mysql from 139.59.78.236 port 40856 ssh2
2019-11-01 02:04:00
183.239.61.55 attackspam
Oct 31 16:10:55 nextcloud sshd\[13890\]: Invalid user ADMIN5 from 183.239.61.55
Oct 31 16:10:55 nextcloud sshd\[13890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.239.61.55
Oct 31 16:10:57 nextcloud sshd\[13890\]: Failed password for invalid user ADMIN5 from 183.239.61.55 port 36596 ssh2
...
2019-11-01 02:09:53
59.115.50.237 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/59.115.50.237/ 
 
 TW - 1H : (214)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 59.115.50.237 
 
 CIDR : 59.115.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 4 
  3H - 9 
  6H - 16 
 12H - 55 
 24H - 201 
 
 DateTime : 2019-10-31 13:00:41 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 02:13:50
77.42.121.83 attackspam
Automatic report - Port Scan Attack
2019-11-01 02:00:42
171.223.203.106 attackbots
Unauthorized connection attempt from IP address 171.223.203.106 on Port 445(SMB)
2019-11-01 02:24:23
124.156.50.145 attackspam
" "
2019-11-01 02:04:13
45.136.109.208 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 02:12:20
197.156.93.218 attack
Unauthorized connection attempt from IP address 197.156.93.218 on Port 445(SMB)
2019-11-01 02:27:49
122.176.47.158 attack
Unauthorized connection attempt from IP address 122.176.47.158 on Port 445(SMB)
2019-11-01 02:08:21

Recently Reported IPs

73.225.139.204 46.137.7.39 206.31.128.108 141.83.186.81
98.92.247.75 193.251.12.58 105.18.177.22 14.173.247.116
36.249.218.215 79.28.232.196 204.186.40.44 31.140.218.22
143.150.129.246 8.26.38.83 116.45.209.198 157.3.223.186
79.171.144.56 199.51.96.23 141.212.157.4 190.70.16.94