Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Suwon

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.82.143.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58879
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.82.143.13.			IN	A

;; AUTHORITY SECTION:
.			318	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082801 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 29 08:13:29 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 13.143.82.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.143.82.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.51.104.13 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-10-03 18:03:39
79.129.28.23 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 18:11:53
160.0.215.78 attackbots
" "
2020-10-03 18:14:08
103.223.9.200 attack
port scan and connect, tcp 23 (telnet)
2020-10-03 18:18:14
190.64.68.178 attackspam
Invalid user test1 from 190.64.68.178 port 5477
2020-10-03 17:59:53
36.133.121.14 attack
SSH login attempts.
2020-10-03 17:51:05
113.203.236.211 attackspambots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "teamspeak" at 2020-10-03T05:12:52Z
2020-10-03 17:54:26
203.151.81.77 attackbotsspam
Invalid user ubuntu from 203.151.81.77 port 58012
2020-10-03 17:45:13
46.37.168.7 attackspambots
$f2bV_matches
2020-10-03 18:12:24
198.98.49.181 attackbotsspam
Invalid user alfresco from 198.98.49.181 port 54958
2020-10-03 18:28:43
45.148.122.102 attackbotsspam
SSH login attempts.
2020-10-03 18:31:33
104.248.1.92 attackspam
Oct  3 08:50:52 gitlab sshd[2776385]: Invalid user sahil from 104.248.1.92 port 52380
Oct  3 08:50:52 gitlab sshd[2776385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.92 
Oct  3 08:50:52 gitlab sshd[2776385]: Invalid user sahil from 104.248.1.92 port 52380
Oct  3 08:50:54 gitlab sshd[2776385]: Failed password for invalid user sahil from 104.248.1.92 port 52380 ssh2
Oct  3 08:54:49 gitlab sshd[2776933]: Invalid user guest from 104.248.1.92 port 32954
...
2020-10-03 18:01:24
51.83.188.196 attack
Spam
2020-10-03 18:23:12
190.78.62.64 attack
Unauthorised access (Oct  2) SRC=190.78.62.64 LEN=52 TTL=113 ID=14247 DF TCP DPT=445 WINDOW=8192 SYN
2020-10-03 17:50:48
106.12.207.236 attackbotsspam
Oct  3 12:17:52 vpn01 sshd[21129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.236
Oct  3 12:17:54 vpn01 sshd[21129]: Failed password for invalid user rtorrent from 106.12.207.236 port 34744 ssh2
...
2020-10-03 18:24:47

Recently Reported IPs

140.82.138.58 102.177.180.135 152.88.31.124 74.167.214.164
37.45.118.243 79.36.216.184 189.69.109.83 187.192.183.32
62.19.167.229 94.181.45.27 89.183.13.197 191.173.5.27
97.118.144.204 176.99.3.230 73.123.66.97 211.221.7.239
222.1.176.243 191.184.134.78 195.171.201.75 110.136.134.107