Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Cyprus

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.169.149.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23470
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.169.149.82.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061102 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jun 12 12:09:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 82.149.169.213.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.149.169.213.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
86.126.65.90 attackspambots
villaromeo.de 86.126.65.90 \[14/Nov/2019:23:35:41 +0100\] "POST /wp-login.php HTTP/1.1" 200 2643 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 86.126.65.90 \[14/Nov/2019:23:35:42 +0100\] "POST /wp-login.php HTTP/1.1" 200 2606 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
villaromeo.de 86.126.65.90 \[14/Nov/2019:23:35:42 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 08:37:56
222.186.175.220 attackbots
Nov 15 01:12:56 amit sshd\[31755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Nov 15 01:12:58 amit sshd\[31755\]: Failed password for root from 222.186.175.220 port 12430 ssh2
Nov 15 01:13:15 amit sshd\[31757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
...
2019-11-15 08:24:56
98.126.88.107 attackbots
90 failed attempt(s) in the last 24h
2019-11-15 08:26:53
192.254.73.218 attack
50 failed attempt(s) in the last 24h
2019-11-15 08:07:43
106.13.69.54 attackbots
87 failed attempt(s) in the last 24h
2019-11-15 08:22:42
200.122.249.203 attackbotsspam
88 failed attempt(s) in the last 24h
2019-11-15 08:28:28
192.254.207.123 attackbotsspam
WordPress wp-login brute force :: 192.254.207.123 0.148 - [14/Nov/2019:22:36:06  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2043 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2019-11-15 08:22:22
45.82.153.76 attackbots
2019-11-15 01:05:46 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data \(set_id=giorgio@opso.it\)
2019-11-15 01:05:53 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-15 01:06:01 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-15 01:06:06 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-15 01:06:19 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-15 08:12:09
222.252.30.117 attackspambots
Invalid user redinbo from 222.252.30.117 port 56544
2019-11-15 08:32:15
185.176.27.178 attackbots
Nov 15 00:14:29 mail kernel: [5153383.608242] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=1399 PROTO=TCP SPT=43558 DPT=46465 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 15 00:15:48 mail kernel: [5153462.726413] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=21548 PROTO=TCP SPT=43558 DPT=40967 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 15 00:17:39 mail kernel: [5153573.206934] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=62472 PROTO=TCP SPT=43558 DPT=8981 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 15 00:21:54 mail kernel: [5153828.144025] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.176.27.178 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=29270 PROTO=TCP SPT=43558 DPT=17167 WINDOW=1024 RES=0x0
2019-11-15 08:34:55
51.77.195.1 attackbotsspam
Nov 15 01:27:56 server sshd\[5432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.ip-51-77-195.eu  user=root
Nov 15 01:27:58 server sshd\[5432\]: Failed password for root from 51.77.195.1 port 45742 ssh2
Nov 15 01:33:04 server sshd\[6664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.ip-51-77-195.eu  user=root
Nov 15 01:33:07 server sshd\[6664\]: Failed password for root from 51.77.195.1 port 35678 ssh2
Nov 15 01:36:23 server sshd\[7917\]: Invalid user COM from 51.77.195.1
...
2019-11-15 08:08:26
58.162.140.172 attackbots
89 failed attempt(s) in the last 24h
2019-11-15 08:28:10
35.240.189.61 attackbotsspam
35.240.189.61 - - \[14/Nov/2019:23:35:56 +0100\] "POST /wp-login.php HTTP/1.0" 200 4474 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.240.189.61 - - \[14/Nov/2019:23:35:59 +0100\] "POST /wp-login.php HTTP/1.0" 200 4287 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
35.240.189.61 - - \[14/Nov/2019:23:36:01 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-15 08:23:44
106.12.105.193 attackbotsspam
Nov 15 01:07:52 eventyay sshd[25580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.105.193
Nov 15 01:07:54 eventyay sshd[25580]: Failed password for invalid user http from 106.12.105.193 port 33088 ssh2
Nov 15 01:13:17 eventyay sshd[25690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.105.193
...
2019-11-15 08:23:03
62.234.141.48 attackbots
Nov 15 00:40:12 nextcloud sshd\[10514\]: Invalid user alex from 62.234.141.48
Nov 15 00:40:12 nextcloud sshd\[10514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48
Nov 15 00:40:14 nextcloud sshd\[10514\]: Failed password for invalid user alex from 62.234.141.48 port 52828 ssh2
...
2019-11-15 08:15:26

Recently Reported IPs

45.249.247.37 137.226.17.172 195.154.45.207 137.226.16.175
137.226.17.173 46.44.1.48 137.226.17.179 46.83.0.22
137.226.17.180 46.100.107.36 137.226.17.181 46.101.8.61
59.103.236.31 137.226.17.182 137.226.17.183 137.226.17.174
190.89.146.58 137.226.18.80 137.226.18.82 137.226.18.87