Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: Microsoft Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.163.82.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11574
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;52.163.82.162.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Aug 27 09:52:31 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 162.82.163.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 162.82.163.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.230.180.65 attack
Jun  8 07:08:08 PorscheCustomer sshd[7840]: Failed password for root from 111.230.180.65 port 44308 ssh2
Jun  8 07:10:12 PorscheCustomer sshd[7931]: Failed password for root from 111.230.180.65 port 40088 ssh2
...
2020-06-08 20:02:23
123.192.176.145 attackspambots
Unauthorized connection attempt from IP address 123.192.176.145 on Port 445(SMB)
2020-06-08 19:48:16
134.122.20.113 attack
Jun  8 13:52:15 vmd26974 sshd[459]: Failed password for root from 134.122.20.113 port 53252 ssh2
...
2020-06-08 20:24:11
50.67.178.164 attackspam
Brute-force attempt banned
2020-06-08 20:15:08
106.12.190.254 attackspambots
Jun  8 14:02:02 PorscheCustomer sshd[21936]: Failed password for root from 106.12.190.254 port 58070 ssh2
Jun  8 14:05:51 PorscheCustomer sshd[22045]: Failed password for root from 106.12.190.254 port 46262 ssh2
...
2020-06-08 20:26:05
49.235.96.146 attackspam
Jun  8 14:05:18 nextcloud sshd\[23110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.96.146  user=root
Jun  8 14:05:19 nextcloud sshd\[23110\]: Failed password for root from 49.235.96.146 port 33540 ssh2
Jun  8 14:09:52 nextcloud sshd\[29295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.96.146  user=root
2020-06-08 20:26:27
185.195.25.200 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-08 20:07:17
197.53.52.92 attackbotsspam
Lines containing failures of 197.53.52.92
2020-06-08 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.53.52.92
2020-06-08 20:22:05
51.83.193.144 attackbotsspam
Jun  8 12:02:55 localhost sshd[27617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip144.ip-51-83-193.eu  user=root
Jun  8 12:02:57 localhost sshd[27617]: Failed password for root from 51.83.193.144 port 45926 ssh2
Jun  8 12:06:26 localhost sshd[28061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip144.ip-51-83-193.eu  user=root
Jun  8 12:06:28 localhost sshd[28061]: Failed password for root from 51.83.193.144 port 49128 ssh2
Jun  8 12:09:55 localhost sshd[28445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip144.ip-51-83-193.eu  user=root
Jun  8 12:09:57 localhost sshd[28445]: Failed password for root from 51.83.193.144 port 52328 ssh2
...
2020-06-08 20:23:40
89.25.253.186 attack
Unauthorized connection attempt from IP address 89.25.253.186 on Port 445(SMB)
2020-06-08 19:59:14
133.130.89.210 attackspambots
Jun  8 08:51:13 journals sshd\[85271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
Jun  8 08:51:15 journals sshd\[85271\]: Failed password for root from 133.130.89.210 port 46238 ssh2
Jun  8 08:55:01 journals sshd\[85736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
Jun  8 08:55:03 journals sshd\[85736\]: Failed password for root from 133.130.89.210 port 49378 ssh2
Jun  8 08:58:57 journals sshd\[86208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
...
2020-06-08 19:51:28
123.1.154.200 attack
odoo8
...
2020-06-08 20:17:49
1.55.205.176 attackbots
Unauthorized connection attempt from IP address 1.55.205.176 on Port 445(SMB)
2020-06-08 20:10:08
61.185.114.130 attackbots
Jun  8 13:44:41 santamaria sshd\[980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130  user=root
Jun  8 13:44:43 santamaria sshd\[980\]: Failed password for root from 61.185.114.130 port 39044 ssh2
Jun  8 13:51:46 santamaria sshd\[1105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.185.114.130  user=root
...
2020-06-08 20:02:42
46.224.209.166 attackbotsspam
Unauthorized connection attempt from IP address 46.224.209.166 on Port 445(SMB)
2020-06-08 19:54:12

Recently Reported IPs

62.249.155.12 192.162.193.243 150.16.54.160 192.198.43.133
248.240.123.102 84.163.63.66 77.42.125.33 49.82.12.149
24.121.221.253 14.29.187.132 51.15.183.122 183.186.171.184
37.6.42.64 92.119.236.24 103.231.160.125 94.15.4.86
116.196.80.104 107.170.138.54 190.145.7.42 81.184.103.145