Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 250.122.195.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;250.122.195.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 00:56:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 82.195.122.250.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.195.122.250.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.83.27.171 attack
20/5/28@23:54:16: FAIL: Alarm-Intrusion address from=202.83.27.171
...
2020-05-29 14:16:34
5.157.11.56 attackspambots
Automatic report - Banned IP Access
2020-05-29 14:49:55
185.23.80.95 attack
Unauthorised access (May 29) SRC=185.23.80.95 LEN=52 PREC=0x20 TTL=121 ID=18993 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-29 14:35:02
139.199.98.175 attackspambots
Invalid user walter from 139.199.98.175 port 44696
2020-05-29 14:32:38
106.13.184.139 attackspambots
 TCP (SYN) 106.13.184.139:50520 -> port 18410, len 44
2020-05-29 14:48:49
129.211.174.145 attack
May 29 08:09:42 [host] sshd[6544]: pam_unix(sshd:a
May 29 08:09:44 [host] sshd[6544]: Failed password
May 29 08:13:09 [host] sshd[6714]: pam_unix(sshd:a
2020-05-29 14:53:56
117.6.97.138 attack
Invalid user orlando from 117.6.97.138 port 20832
2020-05-29 14:51:28
187.157.135.152 attack
Invalid user gpr from 187.157.135.152 port 45868
2020-05-29 14:34:03
79.137.77.131 attack
(sshd) Failed SSH login from 79.137.77.131 (FR/France/131.ip-79-137-77.eu): 5 in the last 3600 secs
2020-05-29 14:27:17
122.114.113.158 attackspambots
Invalid user energy from 122.114.113.158 port 38736
2020-05-29 14:35:17
49.235.85.117 attack
Invalid user technical from 49.235.85.117 port 51218
2020-05-29 14:47:11
62.33.211.129 attack
(imapd) Failed IMAP login from 62.33.211.129 (RU/Russia/-): 1 in the last 3600 secs
2020-05-29 14:53:20
136.61.209.73 attack
Invalid user i from 136.61.209.73 port 58508
2020-05-29 14:47:58
118.27.9.229 attackspam
SSH login attempts.
2020-05-29 14:31:26
190.186.110.115 attack
Telnet Server BruteForce Attack
2020-05-29 14:41:46

Recently Reported IPs

88.209.163.30 238.255.149.42 209.221.250.115 220.5.175.151
61.124.176.69 160.99.18.90 221.24.188.209 15.216.42.121
164.86.79.186 98.179.116.16 234.7.67.113 98.228.154.13
76.237.234.128 96.222.244.116 205.128.13.81 231.111.174.110
78.38.199.38 32.32.119.180 104.106.124.68 2.193.45.220