Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.193.68.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.193.68.82.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101700 1800 900 604800 86400

;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 18 04:04:07 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 82.68.193.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
** server can't find 82.68.193.193.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
106.12.89.154 attackspambots
Oct  6 11:35:18 ns3033917 sshd[2938]: Failed password for root from 106.12.89.154 port 50820 ssh2
Oct  6 11:37:45 ns3033917 sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.154  user=root
Oct  6 11:37:47 ns3033917 sshd[2966]: Failed password for root from 106.12.89.154 port 47400 ssh2
...
2020-10-07 05:34:42
78.128.113.121 attackspam
abuse-sasl
2020-10-07 05:19:58
43.250.105.217 attackspambots
leo_www
2020-10-07 05:26:24
49.144.105.39 attackspam
Oct  5 22:40:09 mxgate1 sshd[30494]: Did not receive identification string from 49.144.105.39 port 13636
Oct  5 22:40:20 mxgate1 sshd[30499]: Invalid user service from 49.144.105.39 port 13997
Oct  5 22:40:20 mxgate1 sshd[30499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.144.105.39


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.144.105.39
2020-10-07 05:37:03
154.34.24.212 attack
Oct  6 16:06:11 gospond sshd[17691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.34.24.212  user=root
Oct  6 16:06:14 gospond sshd[17691]: Failed password for root from 154.34.24.212 port 36360 ssh2
...
2020-10-07 05:29:02
124.232.138.185 attackbotsspam
Oct  6 17:23:26 mx sshd[6486]: Failed password for root from 124.232.138.185 port 38154 ssh2
Oct  6 17:26:12 mx sshd[8791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.232.138.185
2020-10-07 05:31:20
222.186.31.166 attackbotsspam
Oct  6 23:05:53 theomazars sshd[2175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
Oct  6 23:05:56 theomazars sshd[2175]: Failed password for root from 222.186.31.166 port 51417 ssh2
2020-10-07 05:06:28
191.253.232.206 attack
1601930638 - 10/05/2020 22:43:58 Host: 191.253.232.206/191.253.232.206 Port: 22 TCP Blocked
...
2020-10-07 05:10:24
113.59.196.102 attackbotsspam
20/10/5@16:43:29: FAIL: Alarm-Network address from=113.59.196.102
...
2020-10-07 05:33:00
49.230.168.74 attack
Port scan on 1 port(s): 445
2020-10-07 05:32:13
150.95.177.195 attackspam
Oct  6 22:43:53 [host] sshd[29511]: pam_unix(sshd:
Oct  6 22:43:55 [host] sshd[29511]: Failed passwor
Oct  6 22:47:09 [host] sshd[29674]: pam_unix(sshd:
2020-10-07 05:17:54
218.92.0.246 attackbots
Oct  6 18:05:30 shivevps sshd[29587]: Failed password for root from 218.92.0.246 port 48905 ssh2
Oct  6 18:05:39 shivevps sshd[29587]: Failed password for root from 218.92.0.246 port 48905 ssh2
Oct  6 18:05:43 shivevps sshd[29587]: Failed password for root from 218.92.0.246 port 48905 ssh2
...
2020-10-07 05:22:15
106.52.205.211 attack
[ssh] SSH attack
2020-10-07 05:19:30
192.241.153.102 attackbots
Oct  6 22:58:51 fhem-rasp sshd[22481]: Failed password for root from 192.241.153.102 port 49744 ssh2
Oct  6 22:58:52 fhem-rasp sshd[22481]: Disconnected from authenticating user root 192.241.153.102 port 49744 [preauth]
...
2020-10-07 05:20:30
112.85.42.176 attackspam
2020-10-06T21:38:35.942478shield sshd\[30952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2020-10-06T21:38:38.665322shield sshd\[30952\]: Failed password for root from 112.85.42.176 port 10535 ssh2
2020-10-06T21:38:41.887858shield sshd\[30952\]: Failed password for root from 112.85.42.176 port 10535 ssh2
2020-10-06T21:38:44.631173shield sshd\[30952\]: Failed password for root from 112.85.42.176 port 10535 ssh2
2020-10-06T21:38:47.321272shield sshd\[30952\]: Failed password for root from 112.85.42.176 port 10535 ssh2
2020-10-07 05:40:24

Recently Reported IPs

205.11.191.47 64.41.83.26 66.230.221.126 218.1.52.76
107.113.88.117 201.69.255.187 76.232.88.176 35.206.159.165
113.140.94.125 166.135.35.126 201.68.156.17 75.137.139.93
119.138.225.223 153.33.46.30 201.68.154.98 200.223.211.83
138.110.29.147 60.124.86.203 201.68.132.245 126.192.59.25