Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cairo

Region: Al Qahirah

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '196.144.0.0 - 196.159.255.255'

% No abuse contact registered for 196.144.0.0 - 196.159.255.255

inetnum:        196.144.0.0 - 196.159.255.255
netname:        Vodafone-Data-Routes
descr:          Vodafone-Data-Routes
country:        EG
admin-c:        WS16-AFRINIC
tech-c:         WS16-AFRINIC
status:         ASSIGNED PA
mnt-by:         RAYA-MNT
source:         AFRINIC # Filtered
parent:         196.128.0.0 - 196.159.255.255

person:         Wafaa Salah
address:        Vodafone Egypt, Smart Village
address:        Vodafone C3 Building, Cairo/Alex
address:        Desert Road KM
address:        28– 6th of October City
address:        Egypt
phone:          tel:+20-2-5292100
fax-no:         tel:+20-2-5292100
nic-hdl:        WS16-AFRINIC
mnt-by:         GENERATED-TTBB09IYBCMXVHLITNEXQGPRUA2RRKEG-MNT
source:         AFRINIC # Filtered

% Information related to '196.152.212.0/22AS36935'

route:          196.152.212.0/22
descr:          Vodafone Data routes
origin:         AS36935
mnt-by:         VFDATA-MNT
source:         AFRINIC # Filtered
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.152.213.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.152.213.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042800 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 14:43:44 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 82.213.152.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.213.152.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
177.36.242.162 attackbotsspam
Autoban   177.36.242.162 AUTH/CONNECT
2019-06-25 13:51:17
164.132.80.137 attackspam
Jun 24 19:59:51 TORMINT sshd\[3129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137  user=root
Jun 24 19:59:53 TORMINT sshd\[3129\]: Failed password for root from 164.132.80.137 port 48150 ssh2
Jun 24 20:01:20 TORMINT sshd\[3242\]: Invalid user balance from 164.132.80.137
Jun 24 20:01:20 TORMINT sshd\[3242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
...
2019-06-25 13:37:57
177.73.107.174 attack
Autoban   177.73.107.174 AUTH/CONNECT
2019-06-25 13:14:19
177.91.186.33 attackspambots
Autoban   177.91.186.33 AUTH/CONNECT
2019-06-25 13:03:24
177.69.68.162 attack
Autoban   177.69.68.162 AUTH/CONNECT
2019-06-25 13:20:00
180.250.131.250 attackbots
Reported by AbuseIPDB proxy server.
2019-06-25 13:28:34
125.77.252.164 attackspambots
2019-06-25T00:07:57.148572stark.klein-stark.info sshd\[1989\]: Invalid user prestashop from 125.77.252.164 port 1051
2019-06-25T00:07:57.202745stark.klein-stark.info sshd\[1989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.77.252.164
2019-06-25T00:07:59.341851stark.klein-stark.info sshd\[1989\]: Failed password for invalid user prestashop from 125.77.252.164 port 1051 ssh2
...
2019-06-25 13:45:47
50.199.225.204 attackbots
Jun 25 06:38:28 cp sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.225.204
Jun 25 06:38:28 cp sshd[2966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.225.204
2019-06-25 13:23:18
128.201.77.94 attackspam
$f2bV_matches
2019-06-25 13:41:16
188.255.246.215 attackspambots
Port scan and direct access per IP instead of hostname
2019-06-25 13:50:49
177.98.77.101 attackspambots
Autoban   177.98.77.101 AUTH/CONNECT
2019-06-25 13:01:00
177.74.215.90 attackspam
Autoban   177.74.215.90 AUTH/CONNECT
2019-06-25 13:12:17
207.154.196.231 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-06-25 13:26:13
47.92.128.217 attackspam
Jun 25 00:01:10 pornomens sshd\[3510\]: Invalid user tian from 47.92.128.217 port 48143
Jun 25 00:01:10 pornomens sshd\[3510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.92.128.217
Jun 25 00:01:12 pornomens sshd\[3510\]: Failed password for invalid user tian from 47.92.128.217 port 48143 ssh2
...
2019-06-25 13:15:39
177.44.74.206 attackbots
Autoban   177.44.74.206 AUTH/CONNECT
2019-06-25 13:37:29

Recently Reported IPs

10.132.222.123 121.230.89.97 2606:4700:10::6814:8062 2606:4700:10::6814:8426
2606:4700:10::6816:3973 104.168.109.197 131.9.39.151 178.22.135.141
58.240.69.236 136.249.240.220 191.206.80.25 12.12.96.130
166.112.130.151 36.140.162.242 49.231.122.72 2606:4700:10::6814:7291
2606:4700:10::6814:7152 2606:4700:10::6816:526 150.109.12.46 185.145.240.105