Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 219.94.199.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;219.94.199.82.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:07:42 CST 2022
;; MSG SIZE  rcvd: 106
Host info
82.199.94.219.in-addr.arpa domain name pointer 82.199.94.219.static.www408b.sakura.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
82.199.94.219.in-addr.arpa	name = 82.199.94.219.static.www408b.sakura.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.9.67.48 attackspam
Honeypot attack, port: 445, PTR: 200-9-67-48.rev.parauapebas.pa.gov.br.
2020-09-04 16:14:55
207.46.13.103 attackbots
Automatic report - Banned IP Access
2020-09-04 16:33:45
124.163.228.79 attack
Sep  4 11:32:42 hosting sshd[7728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.163.228.79  user=mysql
Sep  4 11:32:44 hosting sshd[7728]: Failed password for mysql from 124.163.228.79 port 33593 ssh2
...
2020-09-04 16:36:48
79.132.103.250 attackbots
Unauthorized connection attempt from IP address 79.132.103.250 on Port 445(SMB)
2020-09-04 16:28:41
162.142.125.30 attackbots
Port scanning [6 denied]
2020-09-04 16:47:22
61.142.75.66 attackbotsspam
Attempted connection to port 1433.
2020-09-04 16:29:04
188.234.247.110 attackspambots
2020-09-03T22:03:32.183044upcloud.m0sh1x2.com sshd[28009]: Invalid user postgres from 188.234.247.110 port 56814
2020-09-04 16:12:41
212.164.49.35 attack
SP-Scan 50456:1433 detected 2020.09.03 09:21:58
blocked until 2020.10.23 02:24:45
2020-09-04 16:33:15
66.249.64.34 attackspam
Automatic report - Banned IP Access
2020-09-04 16:45:10
190.39.57.12 attackspam
Honeypot attack, port: 445, PTR: 190-39-57-12.dyn.dsl.cantv.net.
2020-09-04 16:47:43
170.231.82.53 attackspambots
Attempted connection to port 445.
2020-09-04 16:40:56
67.205.137.155 attackbotsspam
Invalid user solr from 67.205.137.155 port 46414
2020-09-04 16:20:56
79.44.222.128 attackbotsspam
Unwanted checking 80 or 443 port
...
2020-09-04 16:09:36
123.16.153.10 attackspam
445/tcp
[2020-09-04]1pkt
2020-09-04 16:23:34
185.7.85.128 attack
Unauthorized connection attempt from IP address 185.7.85.128 on Port 445(SMB)
2020-09-04 16:24:38

Recently Reported IPs

219.94.200.136 219.94.200.45 219.94.192.87 31.46.217.178
219.94.200.49 219.94.203.111 219.94.203.102 216.176.129.254
219.94.200.6 219.94.203.177 219.94.203.190 219.94.206.106
219.94.203.53 219.94.206.48 219.94.203.160 219.94.203.123
219.94.208.119 219.94.209.194 219.94.203.65 219.94.210.251