Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.82.242.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.82.242.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:15:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 6.242.82.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.242.82.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.2 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:10:52
137.59.0.6 attack
Feb  6 07:12:15 legacy sshd[25960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.0.6
Feb  6 07:12:17 legacy sshd[25960]: Failed password for invalid user rad from 137.59.0.6 port 50563 ssh2
Feb  6 07:16:25 legacy sshd[26232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.0.6
...
2020-02-06 14:26:37
95.0.72.9 attackspambots
web Attack on Website at 2020-02-05.
2020-02-06 13:56:41
91.225.166.1 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:08:03
103.103.143.64 attackbots
2020-02-05T21:56:18.684616linuxbox-skyline sshd[22746]: Invalid user avanthi from 103.103.143.64 port 51773
...
2020-02-06 13:54:24
185.142.236.35 attackspambots
Unauthorized connection attempt detected from IP address 185.142.236.35 to port 11 [J]
2020-02-06 14:03:23
89.44.131.2 attack
web Attack on Website at 2020-02-05.
2020-02-06 14:08:33
185.156.73.49 attack
02/06/2020-00:32:52.426221 185.156.73.49 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-06 13:37:21
180.76.53.114 attackbots
Feb  6 06:42:12 markkoudstaal sshd[29357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.53.114
Feb  6 06:42:14 markkoudstaal sshd[29357]: Failed password for invalid user etn from 180.76.53.114 port 42268 ssh2
Feb  6 06:46:01 markkoudstaal sshd[29996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.53.114
2020-02-06 13:55:07
79.108.209.1 attackspambots
web Attack on Website at 2020-02-05.
2020-02-06 14:25:30
213.142.151.9 attackbots
Feb  6 05:56:28 grey postfix/smtpd\[27827\]: NOQUEUE: reject: RCPT from unknown\[213.142.151.9\]: 554 5.7.1 Service unavailable\; Client host \[213.142.151.9\] blocked using psbl.surriel.com\; Listed in PSBL, see http://psbl.org/listing\?ip=213.142.151.9\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-06 13:49:46
218.92.0.138 attackbotsspam
Feb  6 07:02:33 ns381471 sshd[6991]: Failed password for root from 218.92.0.138 port 45233 ssh2
Feb  6 07:02:46 ns381471 sshd[6991]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 45233 ssh2 [preauth]
2020-02-06 14:05:33
220.76.205.178 attackspambots
Unauthorized connection attempt detected from IP address 220.76.205.178 to port 2220 [J]
2020-02-06 13:54:47
185.156.73.52 attackspam
02/06/2020-00:34:20.776827 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-06 13:46:42
106.12.172.248 attack
Unauthorized connection attempt detected from IP address 106.12.172.248 to port 2220 [J]
2020-02-06 14:09:47

Recently Reported IPs

180.192.132.56 5.169.41.167 101.200.118.227 4.90.120.193
59.104.67.215 25.170.231.181 179.65.105.85 17.222.38.52
247.22.171.217 98.245.138.234 117.243.132.212 24.221.54.52
77.246.147.236 60.172.178.47 210.142.96.221 188.9.213.61
80.116.173.55 237.103.56.81 155.22.31.53 32.196.121.158