Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ukraine

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.247.13.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.247.13.82.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:15:27 CST 2022
;; MSG SIZE  rcvd: 106
Host info
82.13.247.194.in-addr.arpa domain name pointer d274.default-host.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.13.247.194.in-addr.arpa	name = d274.default-host.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.84.103.120 attackbots
Automatic report - XMLRPC Attack
2019-12-14 16:33:17
50.227.212.101 attackbots
Dec 14 09:34:45 MK-Soft-VM4 sshd[21874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.227.212.101 
Dec 14 09:34:47 MK-Soft-VM4 sshd[21874]: Failed password for invalid user csgosrv from 50.227.212.101 port 58068 ssh2
...
2019-12-14 16:58:42
159.203.27.100 attackspambots
Automatic report - XMLRPC Attack
2019-12-14 16:38:00
200.212.252.130 attack
Dec 14 09:38:57 OPSO sshd\[4996\]: Invalid user micah from 200.212.252.130 port 38628
Dec 14 09:38:57 OPSO sshd\[4996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.212.252.130
Dec 14 09:38:59 OPSO sshd\[4996\]: Failed password for invalid user micah from 200.212.252.130 port 38628 ssh2
Dec 14 09:45:43 OPSO sshd\[6533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.212.252.130  user=daemon
Dec 14 09:45:45 OPSO sshd\[6533\]: Failed password for daemon from 200.212.252.130 port 47166 ssh2
2019-12-14 16:59:51
178.128.31.218 attackspambots
fail2ban honeypot
2019-12-14 16:54:58
103.235.170.149 attackbots
Dec 14 07:41:00 vtv3 sshd[18296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.149 
Dec 14 07:41:02 vtv3 sshd[18296]: Failed password for invalid user smmsp from 103.235.170.149 port 39198 ssh2
Dec 14 07:49:40 vtv3 sshd[22372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.149 
Dec 14 08:00:48 vtv3 sshd[28062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.149 
Dec 14 08:00:50 vtv3 sshd[28062]: Failed password for invalid user bet from 103.235.170.149 port 41160 ssh2
Dec 14 08:06:32 vtv3 sshd[30777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.149 
Dec 14 08:17:51 vtv3 sshd[3669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.235.170.149 
Dec 14 08:17:53 vtv3 sshd[3669]: Failed password for invalid user xaviera from 103.235.170.149 port 37964 ssh2
D
2019-12-14 17:00:07
154.126.32.138 attack
Dec 14 14:12:32 areeb-Workstation sshd[18317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.126.32.138 
Dec 14 14:12:34 areeb-Workstation sshd[18317]: Failed password for invalid user hard from 154.126.32.138 port 53392 ssh2
...
2019-12-14 16:45:24
202.144.134.179 attackspambots
Dec 14 08:01:20 srv01 sshd[452]: Invalid user guest from 202.144.134.179 port 41336
Dec 14 08:01:20 srv01 sshd[452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.144.134.179
Dec 14 08:01:20 srv01 sshd[452]: Invalid user guest from 202.144.134.179 port 41336
Dec 14 08:01:22 srv01 sshd[452]: Failed password for invalid user guest from 202.144.134.179 port 41336 ssh2
Dec 14 08:08:19 srv01 sshd[954]: Invalid user thoegersen from 202.144.134.179 port 58514
...
2019-12-14 16:53:10
60.191.214.158 attackbots
1576304889 - 12/14/2019 07:28:09 Host: 60.191.214.158/60.191.214.158 Port: 445 TCP Blocked
2019-12-14 16:22:35
140.143.98.35 attack
Dec 14 08:28:00 icinga sshd[3136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.98.35
Dec 14 08:28:02 icinga sshd[3136]: Failed password for invalid user 88888 from 140.143.98.35 port 40672 ssh2
...
2019-12-14 16:46:09
138.97.14.126 attackspam
Unauthorized connection attempt detected from IP address 138.97.14.126 to port 445
2019-12-14 16:43:07
185.156.73.64 attackbots
12/14/2019-03:38:57.459241 185.156.73.64 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-14 16:46:33
120.28.226.8 attackbots
1576304854 - 12/14/2019 07:27:34 Host: 120.28.226.8/120.28.226.8 Port: 445 TCP Blocked
2019-12-14 16:56:31
149.202.43.72 attackspambots
Automatic report - XMLRPC Attack
2019-12-14 16:45:44
218.92.0.170 attackbots
Dec 14 09:15:18 nextcloud sshd\[27121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.170  user=root
Dec 14 09:15:20 nextcloud sshd\[27121\]: Failed password for root from 218.92.0.170 port 5339 ssh2
Dec 14 09:15:40 nextcloud sshd\[27628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.170  user=root
...
2019-12-14 16:25:35

Recently Reported IPs

194.247.31.31 194.247.8.150 194.247.25.14 194.247.74.21
194.247.8.174 194.247.132.135 194.247.54.2 194.250.56.167
194.25.232.75 194.250.200.81 194.254.227.65 194.250.155.80
194.254.129.22 194.254.129.23 194.254.23.3 194.250.178.228
194.254.37.135 194.254.145.8 194.254.37.163 194.26.129.112