Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.81.82.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37767
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.81.82.216.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:59:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 216.82.81.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.82.81.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
130.61.93.5 attackspambots
Nov 23 08:01:43 [host] sshd[31925]: Invalid user tschantret from 130.61.93.5
Nov 23 08:01:43 [host] sshd[31925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.93.5
Nov 23 08:01:45 [host] sshd[31925]: Failed password for invalid user tschantret from 130.61.93.5 port 51482 ssh2
2019-11-23 15:36:38
106.13.132.28 attackspam
Nov 18 20:58:21 h2570396 sshd[15975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.132.28  user=r.r
Nov 18 20:58:23 h2570396 sshd[15975]: Failed password for r.r from 106.13.132.28 port 40630 ssh2
Nov 18 20:58:23 h2570396 sshd[15975]: Received disconnect from 106.13.132.28: 11: Bye Bye [preauth]
Nov 18 21:03:05 h2570396 sshd[17116]: Failed password for invalid user latrena from 106.13.132.28 port 52284 ssh2
Nov 18 21:03:05 h2570396 sshd[17116]: Received disconnect from 106.13.132.28: 11: Bye Bye [preauth]
Nov 18 21:07:10 h2570396 sshd[17139]: Failed password for invalid user scorpion from 106.13.132.28 port 60622 ssh2
Nov 18 21:07:11 h2570396 sshd[17139]: Received disconnect from 106.13.132.28: 11: Bye Bye [preauth]
Nov 18 21:12:08 h2570396 sshd[17234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.132.28  user=r.r
Nov 18 21:12:11 h2570396 sshd[17234]: Failed password for ........
-------------------------------
2019-11-23 15:28:31
115.236.10.66 attack
Nov 18 15:48:52 xxxxxxx0 sshd[21821]: Invalid user admin from 115.236.10.66 port 34816
Nov 18 15:48:52 xxxxxxx0 sshd[21821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.10.66
Nov 18 15:48:54 xxxxxxx0 sshd[21821]: Failed password for invalid user admin from 115.236.10.66 port 34816 ssh2
Nov 18 16:11:55 xxxxxxx0 sshd[25350]: Invalid user evonetanonymous from 115.236.10.66 port 50946
Nov 18 16:11:55 xxxxxxx0 sshd[25350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.236.10.66

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.236.10.66
2019-11-23 15:25:43
188.166.54.199 attackspambots
2019-11-23T07:17:44.821697shield sshd\[11764\]: Invalid user swantek from 188.166.54.199 port 39223
2019-11-23T07:17:44.825718shield sshd\[11764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199
2019-11-23T07:17:46.997848shield sshd\[11764\]: Failed password for invalid user swantek from 188.166.54.199 port 39223 ssh2
2019-11-23T07:22:12.653188shield sshd\[12750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.54.199  user=operator
2019-11-23T07:22:14.283482shield sshd\[12750\]: Failed password for operator from 188.166.54.199 port 57091 ssh2
2019-11-23 15:33:37
151.236.193.195 attackbots
Nov 23 09:10:27 pkdns2 sshd\[60151\]: Invalid user jeh from 151.236.193.195Nov 23 09:10:29 pkdns2 sshd\[60151\]: Failed password for invalid user jeh from 151.236.193.195 port 38678 ssh2Nov 23 09:14:37 pkdns2 sshd\[60271\]: Invalid user DOSCMD\* from 151.236.193.195Nov 23 09:14:38 pkdns2 sshd\[60271\]: Failed password for invalid user DOSCMD\* from 151.236.193.195 port 58809 ssh2Nov 23 09:18:43 pkdns2 sshd\[60437\]: Invalid user account01 from 151.236.193.195Nov 23 09:18:45 pkdns2 sshd\[60437\]: Failed password for invalid user account01 from 151.236.193.195 port 16882 ssh2
...
2019-11-23 15:37:02
103.52.16.35 attackbots
Nov 23 07:21:47 game-panel sshd[3003]: Failed password for uucp from 103.52.16.35 port 39674 ssh2
Nov 23 07:25:30 game-panel sshd[3135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.52.16.35
Nov 23 07:25:32 game-panel sshd[3135]: Failed password for invalid user luangrath from 103.52.16.35 port 47264 ssh2
2019-11-23 15:28:45
180.250.140.74 attackspambots
Nov 23 07:07:07 124388 sshd[17793]: Failed password for invalid user pi from 180.250.140.74 port 56564 ssh2
Nov 23 07:11:40 124388 sshd[17802]: Invalid user clement from 180.250.140.74 port 42782
Nov 23 07:11:40 124388 sshd[17802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74
Nov 23 07:11:40 124388 sshd[17802]: Invalid user clement from 180.250.140.74 port 42782
Nov 23 07:11:43 124388 sshd[17802]: Failed password for invalid user clement from 180.250.140.74 port 42782 ssh2
2019-11-23 15:56:56
46.38.144.57 attack
Nov 23 08:14:25 webserver postfix/smtpd\[23072\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 23 08:15:11 webserver postfix/smtpd\[21193\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 23 08:15:58 webserver postfix/smtpd\[23134\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 23 08:16:46 webserver postfix/smtpd\[21193\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 23 08:17:33 webserver postfix/smtpd\[23072\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-23 15:27:20
59.180.235.3 attack
Telnetd brute force attack detected by fail2ban
2019-11-23 15:38:53
45.229.154.117 attackbotsspam
Automatic report - Port Scan Attack
2019-11-23 15:43:52
45.113.105.3 attack
scan z
2019-11-23 15:32:19
183.62.139.167 attackbots
Nov 20 08:19:10 ACSRAD auth.info sshd[32185]: Failed password for r.r from 183.62.139.167 port 43125 ssh2
Nov 20 08:19:10 ACSRAD auth.info sshd[32185]: Received disconnect from 183.62.139.167 port 43125:11: Bye Bye [preauth]
Nov 20 08:19:10 ACSRAD auth.info sshd[32185]: Disconnected from 183.62.139.167 port 43125 [preauth]
Nov 20 08:19:11 ACSRAD auth.notice sshguard[1955]: Attack from "183.62.139.167" on service 100 whostnameh danger 10.
Nov 20 08:19:11 ACSRAD auth.notice sshguard[1955]: Attack from "183.62.139.167" on service 100 whostnameh danger 10.
Nov 20 08:24:50 ACSRAD auth.info sshd[2995]: Invalid user lisa from 183.62.139.167 port 58045
Nov 20 08:24:50 ACSRAD auth.info sshd[2995]: Failed password for invalid user lisa from 183.62.139.167 port 58045 ssh2
Nov 20 08:24:50 ACSRAD auth.info sshd[2995]: Received disconnect from 183.62.139.167 port 58045:11: Bye Bye [preauth]
Nov 20 08:24:50 ACSRAD auth.info sshd[2995]: Disconnected from 183.62.139.167 port 58045 [preau........
------------------------------
2019-11-23 15:21:34
222.186.169.194 attackspambots
Nov 23 15:34:10 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:13 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:16 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:16 bacztwo sshd[13659]: Failed keyboard-interactive/pam for root from 222.186.169.194 port 62430 ssh2
Nov 23 15:34:07 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:10 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:13 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:16 bacztwo sshd[13659]: error: PAM: Authentication failure for root from 222.186.169.194
Nov 23 15:34:16 bacztwo sshd[13659]: Failed keyboard-interactive/pam for root from 222.186.169.194 port 62430 ssh2
Nov 23 15:34:19 bacztwo sshd[13659]: error: PAM: Authent
...
2019-11-23 15:35:30
182.140.140.2 attack
Nov 23 01:28:56 Tower sshd[5139]: Connection from 182.140.140.2 port 37772 on 192.168.10.220 port 22
Nov 23 01:28:57 Tower sshd[5139]: Invalid user test from 182.140.140.2 port 37772
Nov 23 01:28:57 Tower sshd[5139]: error: Could not get shadow information for NOUSER
Nov 23 01:28:57 Tower sshd[5139]: Failed password for invalid user test from 182.140.140.2 port 37772 ssh2
Nov 23 01:28:58 Tower sshd[5139]: Received disconnect from 182.140.140.2 port 37772:11: Bye Bye [preauth]
Nov 23 01:28:58 Tower sshd[5139]: Disconnected from invalid user test 182.140.140.2 port 37772 [preauth]
2019-11-23 15:35:48
137.226.113.27 attackbotsspam
mozilla/5.0 zgrab/0.x (compatible; researchscan/t13rl;  http://researchscan.comsys.rwth-aachen.de)
2019-11-23 15:52:08

Recently Reported IPs

35.169.0.123 46.82.188.12 48.136.233.137 244.158.75.200
97.175.183.22 200.152.51.15 67.49.90.231 224.210.255.164
118.245.110.217 195.2.127.157 14.89.56.80 229.51.245.23
94.189.237.223 251.228.107.84 165.185.165.141 205.23.96.166
97.53.192.218 213.137.111.32 86.173.124.82 44.64.101.230