Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Sprint

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.70.82.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.70.82.158.			IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061102 1800 900 604800 86400

;; Query time: 130 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 12 08:08:49 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 158.82.70.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.82.70.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.151.250 attackbotsspam
2020-09-04T07:35:55.425939ionos.janbro.de sshd[110177]: Failed password for invalid user lilah from 106.12.151.250 port 59196 ssh2
2020-09-04T07:39:34.398820ionos.janbro.de sshd[110180]: Invalid user uploader from 106.12.151.250 port 49544
2020-09-04T07:39:34.522150ionos.janbro.de sshd[110180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250
2020-09-04T07:39:34.398820ionos.janbro.de sshd[110180]: Invalid user uploader from 106.12.151.250 port 49544
2020-09-04T07:39:37.098355ionos.janbro.de sshd[110180]: Failed password for invalid user uploader from 106.12.151.250 port 49544 ssh2
2020-09-04T07:43:04.686271ionos.janbro.de sshd[110184]: Invalid user gts from 106.12.151.250 port 39900
2020-09-04T07:43:04.918141ionos.janbro.de sshd[110184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.151.250
2020-09-04T07:43:04.686271ionos.janbro.de sshd[110184]: Invalid user gts from 106.12.151.250 po
...
2020-09-04 19:25:52
188.165.51.56 attackbots
Sep  4 08:52:55 *** sshd[21021]: Invalid user ftp from 188.165.51.56
2020-09-04 19:55:14
36.88.15.207 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 19:33:59
158.69.62.214 attackbots
 TCP (SYN) 158.69.62.214:3841 -> port 23, len 44
2020-09-04 19:56:07
157.40.137.5 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 19:41:38
189.93.26.195 attackspam
(sshd) Failed SSH login from 189.93.26.195 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  3 12:42:13 server5 sshd[22343]: Failed password for root from 189.93.26.195 port 35789 ssh2
Sep  3 12:42:16 server5 sshd[22415]: Failed password for root from 189.93.26.195 port 35790 ssh2
Sep  3 12:42:17 server5 sshd[22461]: Invalid user ubnt from 189.93.26.195
Sep  3 12:42:19 server5 sshd[22461]: Failed password for invalid user ubnt from 189.93.26.195 port 35791 ssh2
Sep  3 12:42:23 server5 sshd[22491]: Failed password for root from 189.93.26.195 port 35792 ssh2
2020-09-04 19:50:55
61.247.178.170 attackspambots
2020-07-25 02:43:09,364 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 61.247.178.170
2020-07-25 03:02:45,389 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 61.247.178.170
2020-07-25 03:18:16,501 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 61.247.178.170
2020-07-25 03:33:48,153 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 61.247.178.170
2020-07-25 03:49:20,225 fail2ban.actions        [18606]: NOTICE  [sshd] Ban 61.247.178.170
...
2020-09-04 19:27:18
182.122.13.198 attack
Lines containing failures of 182.122.13.198
Sep  3 09:30:42 newdogma sshd[30747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.13.198  user=r.r
Sep  3 09:30:45 newdogma sshd[30747]: Failed password for r.r from 182.122.13.198 port 59894 ssh2
Sep  3 09:30:46 newdogma sshd[30747]: Received disconnect from 182.122.13.198 port 59894:11: Bye Bye [preauth]
Sep  3 09:30:46 newdogma sshd[30747]: Disconnected from authenticating user r.r 182.122.13.198 port 59894 [preauth]
Sep  3 09:34:52 newdogma sshd[31619]: Invalid user temp1 from 182.122.13.198 port 12710
Sep  3 09:34:52 newdogma sshd[31619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.122.13.198 
Sep  3 09:34:54 newdogma sshd[31619]: Failed password for invalid user temp1 from 182.122.13.198 port 12710 ssh2
Sep  3 09:34:54 newdogma sshd[31619]: Received disconnect from 182.122.13.198 port 12710:11: Bye Bye [preauth]
Sep  3 09:3........
------------------------------
2020-09-04 19:30:49
116.234.203.159 attack
Sep  3 18:21:47 Horstpolice sshd[13101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.234.203.159  user=r.r
Sep  3 18:21:49 Horstpolice sshd[13101]: Failed password for r.r from 116.234.203.159 port 2048 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.234.203.159
2020-09-04 20:00:23
91.107.21.27 attackspam
SMB Server BruteForce Attack
2020-09-04 19:21:49
122.51.203.177 attack
2020-09-04T13:17[Censored Hostname] sshd[19105]: Invalid user chang from 122.51.203.177 port 50078
2020-09-04T13:17[Censored Hostname] sshd[19105]: Failed password for invalid user chang from 122.51.203.177 port 50078 ssh2
2020-09-04T13:23[Censored Hostname] sshd[19298]: Invalid user openbravo from 122.51.203.177 port 52452[...]
2020-09-04 19:34:51
202.21.98.154 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-04 19:24:48
171.60.241.148 attackbots
Automatic report - Port Scan
2020-09-04 19:58:27
109.227.63.3 attackspam
Sep  4 13:37:56 eventyay sshd[2475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
Sep  4 13:37:58 eventyay sshd[2475]: Failed password for invalid user chungheon from 109.227.63.3 port 49284 ssh2
Sep  4 13:42:03 eventyay sshd[2606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
...
2020-09-04 19:52:28
120.237.118.139 attack
(sshd) Failed SSH login from 120.237.118.139 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 12:34:03 server sshd[5592]: Invalid user mozart from 120.237.118.139
Sep  4 12:34:03 server sshd[5592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.118.139 
Sep  4 12:34:05 server sshd[5592]: Failed password for invalid user mozart from 120.237.118.139 port 49098 ssh2
Sep  4 12:42:49 server sshd[6958]: Invalid user mircea from 120.237.118.139
Sep  4 12:42:49 server sshd[6958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.118.139
2020-09-04 19:48:12

Recently Reported IPs

222.108.232.235 100.193.122.234 200.230.18.62 41.83.165.140
108.34.140.205 104.211.200.136 201.140.186.254 99.240.117.136
154.47.224.52 61.74.11.155 221.197.90.245 129.93.194.180
77.37.146.11 182.166.4.184 180.120.171.30 165.22.56.22
195.167.91.129 123.230.51.251 191.238.221.105 121.242.89.195