Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rome

Region: Lazio

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.82.140.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.82.140.242.			IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041700 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 17 21:13:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
242.140.82.213.in-addr.arpa domain name pointer host-213-82-140-242.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.140.82.213.in-addr.arpa	name = host-213-82-140-242.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.95.53.5 attackbots
Oct 23 22:55:10 SilenceServices sshd[12797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.95.53.5
Oct 23 22:55:13 SilenceServices sshd[12797]: Failed password for invalid user sven from 192.95.53.5 port 48928 ssh2
Oct 23 22:58:49 SilenceServices sshd[15136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.95.53.5
2019-10-24 05:31:07
81.22.45.51 attackbots
10/23/2019-17:05:50.394256 81.22.45.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-24 05:53:00
113.171.23.119 attack
Invalid user oracle from 113.171.23.119 port 58924
2019-10-24 05:37:00
45.40.166.151 attackspam
WordPress brute force
2019-10-24 05:32:54
65.49.212.67 attack
Oct 23 23:30:55 amit sshd\[28905\]: Invalid user ldapuser from 65.49.212.67
Oct 23 23:30:55 amit sshd\[28905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.49.212.67
Oct 23 23:30:57 amit sshd\[28905\]: Failed password for invalid user ldapuser from 65.49.212.67 port 49178 ssh2
...
2019-10-24 05:46:37
151.80.217.219 attackbotsspam
Automatic report - Banned IP Access
2019-10-24 05:38:33
120.36.2.217 attackspam
$f2bV_matches
2019-10-24 05:54:43
182.48.84.6 attack
Oct 23 23:25:37 SilenceServices sshd[32240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.84.6
Oct 23 23:25:39 SilenceServices sshd[32240]: Failed password for invalid user leave from 182.48.84.6 port 36204 ssh2
Oct 23 23:31:09 SilenceServices sshd[3289]: Failed password for root from 182.48.84.6 port 46132 ssh2
2019-10-24 05:49:52
77.49.27.33 attack
Autoban   77.49.27.33 AUTH/CONNECT
2019-10-24 05:39:05
203.101.178.107 attackbotsspam
Oct 23 10:13:54 auw2 sshd\[8264\]: Invalid user changeme from 203.101.178.107
Oct 23 10:13:54 auw2 sshd\[8264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.101.178.107
Oct 23 10:13:56 auw2 sshd\[8264\]: Failed password for invalid user changeme from 203.101.178.107 port 60865 ssh2
Oct 23 10:18:35 auw2 sshd\[8646\]: Invalid user Silverman from 203.101.178.107
Oct 23 10:18:35 auw2 sshd\[8646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.101.178.107
2019-10-24 06:00:22
103.80.25.109 attack
Oct 22 01:56:01 odroid64 sshd\[17370\]: Invalid user chad from 103.80.25.109
Oct 22 01:56:01 odroid64 sshd\[17370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.25.109
Oct 22 01:56:04 odroid64 sshd\[17370\]: Failed password for invalid user chad from 103.80.25.109 port 55039 ssh2
...
2019-10-24 05:36:37
207.154.218.16 attackbots
$f2bV_matches
2019-10-24 05:39:54
112.175.126.18 attackbots
Too Many Connections Or General Abuse
2019-10-24 05:40:18
157.230.156.51 attack
2019-10-23T17:02:10.4386341495-001 sshd\[32666\]: Invalid user RPM from 157.230.156.51 port 54110
2019-10-23T17:02:10.4433491495-001 sshd\[32666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.156.51
2019-10-23T17:02:12.0995701495-001 sshd\[32666\]: Failed password for invalid user RPM from 157.230.156.51 port 54110 ssh2
2019-10-23T17:05:54.0497701495-001 sshd\[32806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.156.51  user=root
2019-10-23T17:05:55.9855821495-001 sshd\[32806\]: Failed password for root from 157.230.156.51 port 37588 ssh2
2019-10-23T17:09:42.3300131495-001 sshd\[32978\]: Invalid user teamspeak from 157.230.156.51 port 49294
2019-10-23T17:09:42.3355361495-001 sshd\[32978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.156.51
...
2019-10-24 05:33:56
50.63.197.86 attackspam
WordPress brute force
2019-10-24 05:31:51

Recently Reported IPs

27.2.208.42 185.6.219.147 147.86.105.200 71.114.152.17
10.225.230.67 27.2.209.42 67.89.107.124 0.74.181.195
10.211.90.147 228.157.193.212 57.114.162.63 90.28.149.71
177.9.198.13 68.249.59.117 5.84.172.20 96.105.131.2
119.17.126.143 97.73.197.85 109.111.70.215 246.141.139.160