Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.159.82.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.159.82.19.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 18:49:21 CST 2022
;; MSG SIZE  rcvd: 105
Host info
19.82.159.18.in-addr.arpa domain name pointer ec2-18-159-82-19.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.82.159.18.in-addr.arpa	name = ec2-18-159-82-19.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
42.187.123.122 attack
Unauthorized connection attempt detected from IP address 42.187.123.122 to port 1433
2019-12-31 20:44:57
42.117.104.150 attack
Unauthorized connection attempt detected from IP address 42.117.104.150 to port 23
2019-12-31 20:46:30
42.118.85.92 attackbotsspam
Caught in portsentry honeypot
2019-12-31 20:45:32
120.27.22.242 attackspam
Unauthorized connection attempt detected from IP address 120.27.22.242 to port 23
2019-12-31 21:07:19
118.193.31.182 attackspambots
Unauthorized connection attempt detected from IP address 118.193.31.182 to port 1883
2019-12-31 21:08:01
106.54.220.51 attack
Unauthorized connection attempt detected from IP address 106.54.220.51 to port 8080
2019-12-31 20:38:45
220.180.104.130 attack
[portscan] tcp/21 [FTP]
[scan/connect: 6 time(s)]
in DroneBL:'listed [IRC Drone]'
in sorbs:'listed [spam]'
*(RWIN=65535)(12311301)
2019-12-31 20:54:21
1.53.18.185 attackspam
Unauthorized connection attempt detected from IP address 1.53.18.185 to port 80
2019-12-31 20:51:33
164.52.24.176 attackbots
Unauthorized connection attempt detected from IP address 164.52.24.176 to port 992
2019-12-31 21:01:47
112.72.93.32 attack
Unauthorized connection attempt detected from IP address 112.72.93.32 to port 23
2019-12-31 20:37:50
222.203.17.150 attack
Unauthorized connection attempt detected from IP address 222.203.17.150 to port 1433
2019-12-31 20:52:55
113.87.160.10 attack
Unauthorized connection attempt detected from IP address 113.87.160.10 to port 445
2019-12-31 20:36:32
176.100.113.83 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-31 21:00:38
139.219.6.50 attackspam
Unauthorized connection attempt detected from IP address 139.219.6.50 to port 13876
2019-12-31 21:02:16
120.234.31.117 attackbots
Unauthorized connection attempt detected from IP address 120.234.31.117 to port 5555
2019-12-31 21:06:48

Recently Reported IPs

18.159.49.177 18.159.85.168 18.159.9.165 18.162.122.10
18.162.103.24 18.162.74.189 18.159.72.130 18.159.86.56
18.162.39.231 18.162.80.175 18.162.78.166 18.162.142.243
18.162.208.88 18.163.145.132 18.163.250.241 18.163.177.100
18.163.133.190 18.163.175.219 18.166.104.104 18.163.89.174