Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '59.82.0.0 - 59.82.255.255'

% Abuse contact for '59.82.0.0 - 59.82.255.255' is 'didong.jc@alibaba-inc.com'

inetnum:        59.82.0.0 - 59.82.255.255
netname:        ALIBABA-CN-NET
descr:          Hangzhou Alibaba Advertising Co.,Ltd.
descr:          No.699, Wangshang RD., Hangzhou, China
country:        CN
admin-c:        ZM678-AP
tech-c:         ZM877-AP
tech-c:         ZM876-AP
abuse-c:        AC1601-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-CNNIC-AP
mnt-irt:        IRT-ALIBABA-CN-NET-CN
mnt-lower:      MAINT-CNNIC-AP
mnt-routes:     MAINT-CNNIC-AP
last-modified:  2023-11-28T00:58:21Z
source:         APNIC

irt:            IRT-ALIBABA-CN-NET-CN
address:        No.699, Wangshang RD., Hangzhou, China
e-mail:         didong.jc@alibaba-inc.com
abuse-mailbox:  didong.jc@alibaba-inc.com
auth:           # Filtered
admin-c:        ZM678-AP
tech-c:         ZM678-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-09-05T23:38:38Z
source:         APNIC

role:           ABUSE CNNICCN
country:        ZZ
address:        Beijing, China
phone:          +000000000
e-mail:         ipas@cnnic.cn
admin-c:        IP50-AP
tech-c:         IP50-AP
nic-hdl:        AC1601-AP
remarks:        Generated from irt object IRT-CNNIC-CN
remarks:        ipas@cnnic.cn is invalid
abuse-mailbox:  ipas@cnnic.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T17:20:32Z
source:         APNIC

person:         Shuo Yu
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022600
e-mail:         anti-spam@list.alibaba-inc.com
nic-hdl:        ZM678-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2021-04-13T23:21:57Z
source:         APNIC

person:         security trouble
e-mail:         abuse@alibaba-inc.com
address:        5th,floor,Building D,the West Lake International Plaza of S&T,391#Wen??r Road
address:        Hangzhou, Zhejiang, China
phone:          +86-0571-85022600
country:        CN
mnt-by:         MAINT-CNNIC-AP
nic-hdl:        ZM876-AP
last-modified:  2025-07-01T07:06:11Z
source:         APNIC

person:         Guowei Pan
address:        5F, Builing D, the West Lake International Plaza of S&T
address:        No.391 Wen'er Road, Hangzhou City
address:        Zhejiang, China, 310099
country:        CN
phone:          +86-0571-85022088-30763
fax-no:         +86-0571-85022600
e-mail:         abuse@alibaba-inc.com
nic-hdl:        ZM877-AP
mnt-by:         MAINT-CNNIC-AP
last-modified:  2025-07-01T07:05:46Z
source:         APNIC

% Information related to '59.82.135.0/24AS37963'

route:          59.82.135.0/24
origin:         AS37963
descr:          China Internet Network Information Center
                Floor1, Building No.1 C/-Chinese Academy of Sciences
                4, South 4th Street
                Haidian District,
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-02-18T01:18:02Z
source:         APNIC

% Information related to '59.82.135.0/24AS45102'

route:          59.82.135.0/24
origin:         AS45102
descr:          China Internet Network Information Center
                Floor1, Building No.1 C/-Chinese Academy of Sciences
                4, South 4th Street
                Haidian District,
mnt-by:         MAINT-CNNIC-AP
last-modified:  2020-02-18T01:19:53Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.135.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52897
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.82.135.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 25 02:00:09 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 21.135.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.135.82.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.76.148.82 attack
0,30-02/29 [bc01/m15] PostRequest-Spammer scoring: zurich
2020-03-20 06:02:56
13.75.232.117 attackspam
Mar 19 22:54:41 mout sshd[32249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.75.232.117  user=root
Mar 19 22:54:44 mout sshd[32249]: Failed password for root from 13.75.232.117 port 45980 ssh2
2020-03-20 06:01:07
188.254.0.124 attack
2020-03-18 20:19:12 server sshd[75205]: Failed password for invalid user riak from 188.254.0.124 port 43338 ssh2
2020-03-20 05:46:57
27.34.251.60 attack
DATE:2020-03-19 22:57:14, IP:27.34.251.60, PORT:ssh SSH brute force auth (docker-dc)
2020-03-20 06:14:10
139.59.59.75 attackspambots
WordPress login Brute force / Web App Attack on client site.
2020-03-20 05:59:13
14.169.172.106 attack
2020-03-1922:52:231jF35R-0003vs-34\<=info@whatsup2013.chH=\(localhost\)[123.25.30.87]:48740P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3653id=0A0FB9EAE1351BA87471388044535516@whatsup2013.chT="iamChristina"forthomaseppler87@gmail.commarcusr0456@gmail.com2020-03-1922:54:231jF37P-00049q-9p\<=info@whatsup2013.chH=cpe.xe-2-1-1-800.aaanqe10.dk.customer.tdc.net\(localhost\)[2.109.111.130]:36891P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3692id=BBBE085B5084AA19C5C08931F5E2AF83@whatsup2013.chT="iamChristina"fordriesie83@gmail.comadam1z@hotmail.com2020-03-1922:53:291jF36W-00043a-Tq\<=info@whatsup2013.chH=\(localhost\)[123.20.187.163]:57951P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3597id=686DDB88835779CA16135AE226872822@whatsup2013.chT="iamChristina"forag2013762@gmail.comryanpfisher34@gmail.com2020-03-1922:53:111jF36F-00042D-BJ\<=info@whatsup2013.chH=\(localhost\)[14.169.17
2020-03-20 06:10:42
165.227.67.64 attack
Invalid user ocean from 165.227.67.64 port 50022
2020-03-20 05:51:02
45.58.50.135 attackspam
(From keithhoff@imail.party) 
Hello,

I have not received an update regarding measures you're taking to combat COVID-19. I hope you'll assure us that you are following all recently released guidelines and taking every precaution to protect our community?

I'm very concerned that countless young people are not taking COVID-19 seriously (ex. the Spring Break beaches are still packed). I think the only way to combat this 'whatever attitude' is by sharing as much information as possible. 

I hope you will add an alert banner with a link to the CDC's coronavirus page (https://www.cdc.gov/coronavirus/2019-ncov/index.html) or the WHO's page. More importantly, please consider copy & pasting this Creative Commons 4.0 (free to re-publish) article to your site (https://covidblog.info).

Without strict measures and an *educated community*, the number of cases will increase exponentially throughout the global population!

Stay safe,
Keith
2020-03-20 06:11:43
222.186.15.10 attack
19.03.2020 22:08:46 SSH access blocked by firewall
2020-03-20 05:58:36
106.124.136.103 attack
Mar 19 17:55:53 plusreed sshd[27659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.103  user=root
Mar 19 17:55:55 plusreed sshd[27659]: Failed password for root from 106.124.136.103 port 51432 ssh2
Mar 19 18:01:10 plusreed sshd[29016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.103  user=root
Mar 19 18:01:12 plusreed sshd[29016]: Failed password for root from 106.124.136.103 port 48331 ssh2
Mar 19 18:06:29 plusreed sshd[30330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.103  user=bin
Mar 19 18:06:31 plusreed sshd[30330]: Failed password for bin from 106.124.136.103 port 45230 ssh2
...
2020-03-20 06:20:46
106.12.207.34 attackbotsspam
Mar 19 22:52:42 sd-53420 sshd\[8999\]: Invalid user steam from 106.12.207.34
Mar 19 22:52:42 sd-53420 sshd\[8999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.34
Mar 19 22:52:43 sd-53420 sshd\[8999\]: Failed password for invalid user steam from 106.12.207.34 port 36950 ssh2
Mar 19 22:54:49 sd-53420 sshd\[9619\]: User root from 106.12.207.34 not allowed because none of user's groups are listed in AllowGroups
Mar 19 22:54:49 sd-53420 sshd\[9619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.207.34  user=root
...
2020-03-20 05:58:59
212.129.26.136 attack
WordPress login Brute force / Web App Attack on client site.
2020-03-20 06:03:28
138.197.148.135 attackbots
Mar 19 22:15:21 163-172-32-151 sshd[29932]: Invalid user ubuntu from 138.197.148.135 port 46606
...
2020-03-20 05:55:15
211.254.221.70 attackbots
Mar 19 22:13:00 hosting180 sshd[28399]: Invalid user test from 211.254.221.70 port 53972
...
2020-03-20 05:43:40
107.180.21.239 attackspam
This GoDaddy hosted phishing site is impersonating a banking website.
2020-03-20 06:09:50

Recently Reported IPs

59.82.83.156 172.178.115.83 78.198.88.142 59.82.135.179
59.82.135.91 51.158.61.186 154.12.94.119 91.92.243.11
158.44.128.120 32.36.244.67 5.127.198.137 203.91.72.3
5.188.9.122 92.84.40.215 9.155.10.205 98.93.164.96
59.82.83.175 59.82.83.115 3.89.107.76 3.86.147.57