Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gouveia

Region: Guarda

Country: Portugal

Internet Service Provider: MEO

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.82.60.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12179
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.82.60.134.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022301 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 06:12:08 CST 2020
;; MSG SIZE  rcvd: 115
Host info
134.60.82.2.in-addr.arpa domain name pointer bl21-60-134.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.60.82.2.in-addr.arpa	name = bl21-60-134.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.61.26.211 attackbots
The sucker tried to brute force my teeny tiny SSH server
2020-10-07 16:20:18
112.156.25.39 attack
Automatic report - Port Scan Attack
2020-10-07 16:18:59
85.159.214.160 attackbotsspam
Brute forcing email accounts
2020-10-07 16:27:23
138.68.5.192 attack
$f2bV_matches
2020-10-07 16:22:52
200.150.166.23 attackbotsspam
" "
2020-10-07 16:33:21
193.112.56.170 attack
2020-10-06T23:51:43.197139linuxbox-skyline sshd[28724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.56.170  user=root
2020-10-06T23:51:45.505652linuxbox-skyline sshd[28724]: Failed password for root from 193.112.56.170 port 60778 ssh2
...
2020-10-07 16:24:48
178.128.201.175 attackspambots
2020-10-07T09:18:56+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-10-07 16:10:57
159.65.196.65 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-07 15:55:47
191.5.99.121 attackspam
3x Failed Password
2020-10-07 16:06:04
93.91.172.78 attackbotsspam
SP-Scan 61644:445 detected 2020.10.06 14:48:55
blocked until 2020.11.25 06:51:42
2020-10-07 15:51:29
160.19.49.86 attack
SSH Brute-Force reported by Fail2Ban
2020-10-07 16:09:24
119.96.227.154 attackspam
Oct  7 00:04:13 host sshd\[706\]: Failed password for root from 119.96.227.154 port 40790 ssh2
Oct  7 00:05:58 host sshd\[1638\]: Failed password for root from 119.96.227.154 port 58736 ssh2
Oct  7 00:07:44 host sshd\[1700\]: Failed password for root from 119.96.227.154 port 48450 ssh2
...
2020-10-07 16:34:45
111.229.76.117 attackbots
111.229.76.117 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  7 09:47:38 server sshd[4373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.76.117  user=root
Oct  7 09:47:41 server sshd[4373]: Failed password for root from 111.229.76.117 port 45858 ssh2
Oct  7 09:46:13 server sshd[4085]: Failed password for root from 79.137.24.13 port 42924 ssh2
Oct  7 09:50:24 server sshd[4747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.165.232  user=root
Oct  7 09:48:47 server sshd[4528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.104.160  user=root
Oct  7 09:48:49 server sshd[4528]: Failed password for root from 118.24.104.160 port 50226 ssh2

IP Addresses Blocked:
2020-10-07 16:19:13
106.53.202.86 attackbotsspam
Oct  7 00:59:18 hosting sshd[31777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.202.86  user=root
Oct  7 00:59:20 hosting sshd[31777]: Failed password for root from 106.53.202.86 port 52446 ssh2
...
2020-10-07 16:03:50
52.77.116.19 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-10-07 15:51:50

Recently Reported IPs

221.92.47.10 87.101.187.242 103.80.81.56 92.118.38.58
68.200.141.39 219.61.138.95 51.7.19.64 92.117.252.46
175.194.115.212 122.66.213.100 73.183.36.194 95.16.243.85
199.3.217.255 71.226.177.102 152.42.107.60 213.57.212.3
37.0.182.240 220.250.28.130 188.207.208.73 45.218.98.12