Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.12.82.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.12.82.54.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 15:29:19 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 54.82.12.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.82.12.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.43.61.240 attackbotsspam
2019-06-23T10:03:06.931763hub.schaetter.us sshd\[13875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93-43-61-240.ip90.fastwebnet.it  user=root
2019-06-23T10:03:09.455258hub.schaetter.us sshd\[13875\]: Failed password for root from 93.43.61.240 port 43551 ssh2
2019-06-23T10:03:12.593171hub.schaetter.us sshd\[13875\]: Failed password for root from 93.43.61.240 port 43551 ssh2
2019-06-23T10:03:15.683061hub.schaetter.us sshd\[13875\]: Failed password for root from 93.43.61.240 port 43551 ssh2
2019-06-23T10:03:18.627432hub.schaetter.us sshd\[13875\]: Failed password for root from 93.43.61.240 port 43551 ssh2
...
2019-06-23 19:11:28
118.69.128.22 attackspambots
Jun 23 12:18:25 km20725 sshd\[12749\]: Invalid user gmod from 118.69.128.22Jun 23 12:18:26 km20725 sshd\[12749\]: Failed password for invalid user gmod from 118.69.128.22 port 41932 ssh2Jun 23 12:21:29 km20725 sshd\[12859\]: Invalid user venki from 118.69.128.22Jun 23 12:21:30 km20725 sshd\[12859\]: Failed password for invalid user venki from 118.69.128.22 port 41990 ssh2
...
2019-06-23 19:12:41
187.120.140.103 attackbots
$f2bV_matches
2019-06-23 19:14:44
203.177.94.194 attack
Unauthorized connection attempt from IP address 203.177.94.194 on Port 445(SMB)
2019-06-23 18:45:37
191.35.14.7 attack
:
2019-06-23 19:17:53
50.63.13.254 attackspambots
Automatic report - Web App Attack
2019-06-23 18:50:09
88.243.9.68 attackspam
firewall-block, port(s): 23/tcp
2019-06-23 19:31:40
39.87.147.215 attackspam
:
2019-06-23 19:13:01
144.217.166.59 attack
Automatic report - Web App Attack
2019-06-23 19:20:29
187.102.51.220 attackbots
:
2019-06-23 19:20:09
83.42.141.244 attack
DATE:2019-06-23 12:09:29, IP:83.42.141.244, PORT:ssh SSH brute force auth (ermes)
2019-06-23 19:08:43
199.249.230.80 attackspam
2019-06-23T10:03:48.627812abusebot-4.cloudsearch.cf sshd\[4397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor27.quintex.com  user=root
2019-06-23 18:46:12
185.128.43.19 attack
category: Fake ED Pharmacy (Viagra & Cialis)
owner: "Yambo Financials"
recent IP address:
  * Use one of the following IP addresses and change frequently.
 13) 38.135.122.164 _ USA         _ Foxcloud Llp / Psinet, Inc
 12) 80.233.134.142 _ Latvia      _ Telia Latvija SIA
 11) 185.225.16.xxx _ Romania     _ MivoCloud Solutions SRL
 10) 94.176.188.242 _ Lithuania   _ Uab Esnet
  9) 95.216.17.21   _ Finland     _ Hetzner Online Ag
  8) 95.110.232.65  _ Italy       _ Aruba S.p.a
  7) 185.128.43.19  _ Swiss       _ Grupo Panaglobal 15 S.a
  6) 185.38.15.114  _ Netherlands _ YISP B.V
  5) 185.36.81.231  _ Lithuania   _ UAB Host Baltic
  4) 185.24.232.154 _ Ireland     _ Servebyte Dedicated Servers
  3) 212.34.158.133 _ Spain       _ RAN Networks S.L.
  2) 78.107.239.234 _ Russia      _ Corbina Telecom
  1) 95.31.22.193   _ Russia      _ Corbina Telecom
recent domain:
  2019/06/23 smartherbstore.su
  2019/06/23 healingherbsmart.ru
  2019/06/21 fastnaturaleshop.ru
   :
   :
2019-06-23 18:59:52
46.229.168.153 attackspambots
SQL Injection
2019-06-23 19:09:53
18.85.192.253 attack
2019-06-23T10:02:12.194269abusebot-4.cloudsearch.cf sshd\[4368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=wholesomeserver.media.mit.edu  user=root
2019-06-23 19:13:50

Recently Reported IPs

56.140.213.159 203.8.9.185 144.174.69.9 210.33.186.95
193.109.8.20 212.40.78.3 223.207.222.235 170.29.218.98
19.143.140.31 250.241.196.26 138.172.64.67 98.0.96.87
197.103.243.186 24.14.86.22 218.158.7.195 189.126.237.28
240.78.174.126 132.252.145.83 66.214.241.137 192.70.116.105