Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
59.82.21.32 botsattack
ip:59.82.21.32 异常请求,第 5次,已封禁。
59.82.21.32 - - [03/Jun/2025 15:04:17] "POST / HTTP/1.1" 404 -
2025-06-03 15:50:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 59.82.21.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;59.82.21.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025050100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 01 23:30:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 242.21.82.59.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.21.82.59.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
158.69.201.249 attack
s2.hscode.pl - SSH Attack
2020-10-07 20:34:26
52.237.198.242 attackspambots
52.237.198.242 - - [07/Oct/2020:12:04:42 +0100] "POST /wp-login.php HTTP/1.1" 200 2221 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.237.198.242 - - [07/Oct/2020:12:04:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2147 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.237.198.242 - - [07/Oct/2020:12:04:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2197 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-07 20:50:43
151.115.37.105 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-07 20:27:42
190.94.249.242 attackbotsspam
Unauthorized connection attempt from IP address 190.94.249.242 on Port 445(SMB)
2020-10-07 20:57:31
88.250.202.65 attackspambots
Unauthorized connection attempt from IP address 88.250.202.65 on Port 445(SMB)
2020-10-07 20:42:20
46.101.249.232 attack
Port 22 Scan, PTR: None
2020-10-07 20:46:01
71.19.154.84 attackbots
TBI Web Scanner Detection
2020-10-07 20:28:01
120.53.108.58 attackspambots
Oct  7 14:24:16 host1 sshd[1448159]: Failed password for root from 120.53.108.58 port 60070 ssh2
Oct  7 14:30:19 host1 sshd[1448634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.108.58  user=root
Oct  7 14:30:21 host1 sshd[1448634]: Failed password for root from 120.53.108.58 port 60810 ssh2
Oct  7 14:30:19 host1 sshd[1448634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.108.58  user=root
Oct  7 14:30:21 host1 sshd[1448634]: Failed password for root from 120.53.108.58 port 60810 ssh2
...
2020-10-07 21:00:00
42.194.217.169 attackspam
2020-10-07T06:57:37.093727ns386461 sshd\[6773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.217.169  user=root
2020-10-07T06:57:39.114484ns386461 sshd\[6773\]: Failed password for root from 42.194.217.169 port 56582 ssh2
2020-10-07T07:10:16.663441ns386461 sshd\[18147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.217.169  user=root
2020-10-07T07:10:18.881022ns386461 sshd\[18147\]: Failed password for root from 42.194.217.169 port 59326 ssh2
2020-10-07T07:15:06.761711ns386461 sshd\[22659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.217.169  user=root
...
2020-10-07 20:59:22
125.162.34.41 attack
Port scan on 1 port(s): 445
2020-10-07 20:33:18
167.71.185.113 attack
Oct  7 13:45:26 jane sshd[5784]: Failed password for root from 167.71.185.113 port 60448 ssh2
...
2020-10-07 20:23:26
83.97.20.35 attackspam
scans 37 times in preceeding hours on the ports (in chronological order) 2121 8099 9042 9042 7001 8086 8060 20000 37777 5222 1027 4000 2323 50000 18081 5006 8087 32400 6001 8069 8554 8333 3333 5007 7779 9418 5269 9944 4022 27017 5984 2480 1883 9595 10243 5678 4040 resulting in total of 48 scans from 83.97.20.0/24 block.
2020-10-07 20:56:47
218.237.156.34 attackbotsspam
Oct  7 12:09:25 prox sshd[30614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.156.34
2020-10-07 20:34:41
78.128.113.119 attackspam
2020-10-07 14:08:06 dovecot_plain authenticator failed for \(ip-113-119.4vendeta.com.\) \[78.128.113.119\]: 535 Incorrect authentication data \(set_id=mail@yt.gl\)
2020-10-07 14:08:13 dovecot_plain authenticator failed for \(ip-113-119.4vendeta.com.\) \[78.128.113.119\]: 535 Incorrect authentication data
2020-10-07 14:08:21 dovecot_plain authenticator failed for \(ip-113-119.4vendeta.com.\) \[78.128.113.119\]: 535 Incorrect authentication data
2020-10-07 14:08:26 dovecot_plain authenticator failed for \(ip-113-119.4vendeta.com.\) \[78.128.113.119\]: 535 Incorrect authentication data
2020-10-07 14:08:38 dovecot_plain authenticator failed for \(ip-113-119.4vendeta.com.\) \[78.128.113.119\]: 535 Incorrect authentication data
...
2020-10-07 20:27:27
80.211.56.216 attack
Oct  5 10:06:45 CT3029 sshd[23751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.56.216  user=r.r
Oct  5 10:06:48 CT3029 sshd[23751]: Failed password for r.r from 80.211.56.216 port 60158 ssh2
Oct  5 10:06:48 CT3029 sshd[23751]: Received disconnect from 80.211.56.216 port 60158:11: Bye Bye [preauth]
Oct  5 10:06:48 CT3029 sshd[23751]: Disconnected from 80.211.56.216 port 60158 [preauth]
Oct  5 11:08:37 CT3029 sshd[23954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.56.216  user=r.r
Oct  5 11:08:39 CT3029 sshd[23954]: Failed password for r.r from 80.211.56.216 port 48952 ssh2
Oct  5 11:08:39 CT3029 sshd[23954]: Received disconnect from 80.211.56.216 port 48952:11: Bye Bye [preauth]
Oct  5 11:08:39 CT3029 sshd[23954]: Disconnected from 80.211.56.216 port 48952 [preauth]
Oct  5 11:20:03 CT3029 sshd[23982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 t........
-------------------------------
2020-10-07 20:25:50

Recently Reported IPs

20.169.105.32 88.172.29.215 221.199.14.242 172.81.130.105
8.219.155.126 186.63.253.166 2001:16b8:646f:6e00:6d50:2629:889f:5754 1.64.15.125
60.13.7.213 113.128.64.51 111.113.88.230 10.33.224.48
223.113.128.140 37.230.60.160 214.104.151.95 83.11.175.189
201.6.148.15 147.185.133.57 113.215.189.104 113.215.189.103