Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.7.1.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;214.7.1.82.			IN	A

;; AUTHORITY SECTION:
.			522	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 09:33:14 CST 2023
;; MSG SIZE  rcvd: 103
Host info
Host 82.1.7.214.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 214.7.1.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.93.225.150 attack
Invalid user git from 218.93.225.150 port 10539
2020-06-18 05:05:38
38.143.3.155 attack
Invalid user test from 38.143.3.155 port 55614
2020-06-18 04:45:40
124.43.9.184 attack
Invalid user aji from 124.43.9.184 port 36556
2020-06-18 04:54:22
119.29.183.138 attackbots
Jun 17 22:23:12 vps647732 sshd[9939]: Failed password for root from 119.29.183.138 port 47524 ssh2
...
2020-06-18 04:39:45
46.105.95.84 attackspam
Invalid user ark from 46.105.95.84 port 45674
2020-06-18 05:00:40
108.166.155.254 attackbotsspam
detected by Fail2Ban
2020-06-18 04:41:08
111.165.44.203 attack
Invalid user admin from 111.165.44.203 port 60150
2020-06-18 04:40:29
80.211.230.69 attackbotsspam
Jun 17 22:01:42 zulu412 sshd\[10868\]: Invalid user deploy from 80.211.230.69 port 53587
Jun 17 22:01:42 zulu412 sshd\[10868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.230.69
Jun 17 22:01:44 zulu412 sshd\[10868\]: Failed password for invalid user deploy from 80.211.230.69 port 53587 ssh2
...
2020-06-18 04:58:19
195.62.15.247 attackspam
Invalid user admin from 195.62.15.247 port 35826
2020-06-18 04:49:09
77.65.17.2 attackspambots
Brute-Force,SSH
2020-06-18 04:25:28
35.181.7.12 attackbots
Jun 17 07:06:07 garuda sshd[17805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-35-181-7-12.eu-west-3.compute.amazonaws.com  user=r.r
Jun 17 07:06:09 garuda sshd[17805]: Failed password for r.r from 35.181.7.12 port 56018 ssh2
Jun 17 07:06:09 garuda sshd[17805]: Received disconnect from 35.181.7.12: 11: Bye Bye [preauth]
Jun 17 07:21:05 garuda sshd[22335]: Invalid user odoo from 35.181.7.12
Jun 17 07:21:05 garuda sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-35-181-7-12.eu-west-3.compute.amazonaws.com 
Jun 17 07:21:07 garuda sshd[22335]: Failed password for invalid user odoo from 35.181.7.12 port 40052 ssh2
Jun 17 07:21:07 garuda sshd[22335]: Received disconnect from 35.181.7.12: 11: Bye Bye [preauth]
Jun 17 07:24:28 garuda sshd[23050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-35-181-7-12.eu-west-3.compute.amazonaw........
-------------------------------
2020-06-18 04:46:40
134.175.226.233 attackspam
Jun 17 16:44:26 *** sshd[4477]: User root from 134.175.226.233 not allowed because not listed in AllowUsers
2020-06-18 04:53:58
36.133.34.223 attack
Jun 17 21:46:13 ArkNodeAT sshd\[3533\]: Invalid user ftp from 36.133.34.223
Jun 17 21:46:13 ArkNodeAT sshd\[3533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.34.223
Jun 17 21:46:15 ArkNodeAT sshd\[3533\]: Failed password for invalid user ftp from 36.133.34.223 port 44392 ssh2
2020-06-18 04:46:08
51.91.102.99 attackbotsspam
$f2bV_matches
2020-06-18 04:27:33
46.41.139.134 attackspambots
Invalid user yanwei from 46.41.139.134 port 47700
2020-06-18 05:01:18

Recently Reported IPs

53.89.150.6 127.4.239.32 141.136.35.31 12.48.157.27
37.69.198.79 194.75.167.5 30.11.1.204 37.33.34.171
135.188.51.73 147.23.150.91 110.125.92.93 218.154.164.143
49.184.39.144 7.25.240.188 69.214.23.24 0.13.44.160
218.103.103.229 226.37.14.167 19.187.62.223 11.92.101.131