Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.118.82.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;34.118.82.142.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 16:31:01 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 142.82.118.34.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 142.82.118.34.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
49.64.127.179 attackspambots
Telnet Server BruteForce Attack
2020-06-04 01:36:28
50.63.197.110 attackbotsspam
lol @ idiot ...keep feeding me your IP's
2020-06-04 01:49:20
36.75.65.182 attackspam
Automatic report - Port Scan Attack
2020-06-04 01:44:53
201.234.178.151 attackspambots
Unauthorised access (Jun  3) SRC=201.234.178.151 LEN=52 TOS=0x08 TTL=113 ID=14453 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Jun  2) SRC=201.234.178.151 LEN=52 TTL=114 ID=15557 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-04 01:39:05
201.48.4.86 attackspam
Jun  3 19:25:52 journals sshd\[33410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.86  user=root
Jun  3 19:25:54 journals sshd\[33410\]: Failed password for root from 201.48.4.86 port 51894 ssh2
Jun  3 19:30:18 journals sshd\[34086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.86  user=root
Jun  3 19:30:20 journals sshd\[34086\]: Failed password for root from 201.48.4.86 port 51479 ssh2
Jun  3 19:34:42 journals sshd\[34669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.86  user=root
...
2020-06-04 01:41:28
120.70.103.239 attackspam
SSH auth scanning - multiple failed logins
2020-06-04 01:37:23
175.6.70.180 attack
2020-06-03T18:21:56.823903ns386461 sshd\[10650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.70.180  user=root
2020-06-03T18:21:59.079740ns386461 sshd\[10650\]: Failed password for root from 175.6.70.180 port 56056 ssh2
2020-06-03T18:34:47.539893ns386461 sshd\[22224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.70.180  user=root
2020-06-03T18:34:49.640063ns386461 sshd\[22224\]: Failed password for root from 175.6.70.180 port 42502 ssh2
2020-06-03T18:36:49.901073ns386461 sshd\[24333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.70.180  user=root
...
2020-06-04 01:40:06
190.0.57.46 attack
Port Scan - Netlink.GPON.Router.formPing.Remote.Command.Injection
2020-06-04 01:34:26
45.232.50.43 attackbots
firewall-block, port(s): 445/tcp
2020-06-04 01:53:19
122.252.239.5 attackspam
Jun  3 15:03:33 vps687878 sshd\[1365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Jun  3 15:03:35 vps687878 sshd\[1365\]: Failed password for root from 122.252.239.5 port 53894 ssh2
Jun  3 15:07:45 vps687878 sshd\[1851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
Jun  3 15:07:46 vps687878 sshd\[1851\]: Failed password for root from 122.252.239.5 port 57772 ssh2
Jun  3 15:12:30 vps687878 sshd\[2432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.252.239.5  user=root
...
2020-06-04 01:22:14
185.176.27.162 attackspam
Jun  3 20:34:08 debian kernel: [108212.624388] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.176.27.162 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=39574 PROTO=TCP SPT=49148 DPT=60389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-04 01:46:39
91.233.42.38 attackspam
Jun  3 18:55:07 server sshd[57450]: Failed password for root from 91.233.42.38 port 43677 ssh2
Jun  3 18:59:03 server sshd[60587]: Failed password for root from 91.233.42.38 port 45222 ssh2
Jun  3 19:03:00 server sshd[63962]: Failed password for root from 91.233.42.38 port 46767 ssh2
2020-06-04 01:38:02
113.88.138.69 attackspam
Jun  3 18:41:53 mail sshd[8994]: Failed password for root from 113.88.138.69 port 46839 ssh2
...
2020-06-04 01:26:56
111.93.200.50 attackspam
Jun  3 17:58:43 ns382633 sshd\[4530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50  user=root
Jun  3 17:58:46 ns382633 sshd\[4530\]: Failed password for root from 111.93.200.50 port 57655 ssh2
Jun  3 18:10:40 ns382633 sshd\[7065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50  user=root
Jun  3 18:10:41 ns382633 sshd\[7065\]: Failed password for root from 111.93.200.50 port 42657 ssh2
Jun  3 18:14:41 ns382633 sshd\[7412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50  user=root
2020-06-04 01:24:52
165.22.209.138 attackspambots
$f2bV_matches
2020-06-04 01:21:32

Recently Reported IPs

120.172.110.100 53.64.84.15 200.31.103.28 220.147.10.118
238.150.145.160 93.104.219.174 121.0.157.123 7.122.12.224
109.186.74.206 87.245.148.157 134.217.49.245 232.113.242.134
120.158.191.125 126.168.54.247 153.44.116.68 239.168.22.253
199.89.249.222 223.18.247.142 14.211.233.216 212.180.171.188