Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 6.164.239.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1579
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;6.164.239.82.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 01:50:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 82.239.164.6.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 6.164.239.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
104.131.189.116 attackbots
May 28 08:40:54 h2779839 sshd[13491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
May 28 08:40:56 h2779839 sshd[13491]: Failed password for root from 104.131.189.116 port 56294 ssh2
May 28 08:43:12 h2779839 sshd[13519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
May 28 08:43:13 h2779839 sshd[13519]: Failed password for root from 104.131.189.116 port 40360 ssh2
May 28 08:45:24 h2779839 sshd[13577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
May 28 08:45:26 h2779839 sshd[13577]: Failed password for root from 104.131.189.116 port 52658 ssh2
May 28 08:47:41 h2779839 sshd[13637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.116  user=root
May 28 08:47:43 h2779839 sshd[13637]: Failed password for root from 104.131.189.116 port
...
2020-05-28 15:04:50
183.62.139.167 attackbots
Invalid user fran from 183.62.139.167 port 45846
2020-05-28 14:52:46
209.97.168.205 attack
2020-05-28T03:48:15.842866abusebot.cloudsearch.cf sshd[1158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.168.205  user=root
2020-05-28T03:48:18.419997abusebot.cloudsearch.cf sshd[1158]: Failed password for root from 209.97.168.205 port 53272 ssh2
2020-05-28T03:52:02.195491abusebot.cloudsearch.cf sshd[1408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.168.205  user=root
2020-05-28T03:52:03.934862abusebot.cloudsearch.cf sshd[1408]: Failed password for root from 209.97.168.205 port 57190 ssh2
2020-05-28T03:55:48.995580abusebot.cloudsearch.cf sshd[1617]: Invalid user www from 209.97.168.205 port 32908
2020-05-28T03:55:49.001339abusebot.cloudsearch.cf sshd[1617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.168.205
2020-05-28T03:55:48.995580abusebot.cloudsearch.cf sshd[1617]: Invalid user www from 209.97.168.205 port 32908
2020-05-28T03:55:
...
2020-05-28 15:06:46
152.250.252.179 attackspambots
May 27 23:56:20 server1 sshd\[17825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.252.179 
May 27 23:56:22 server1 sshd\[17825\]: Failed password for invalid user tasha from 152.250.252.179 port 46968 ssh2
May 28 00:00:05 server1 sshd\[19369\]: Invalid user s-kodama from 152.250.252.179
May 28 00:00:05 server1 sshd\[19369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.252.179 
May 28 00:00:06 server1 sshd\[19369\]: Failed password for invalid user s-kodama from 152.250.252.179 port 42662 ssh2
...
2020-05-28 15:31:05
14.116.255.229 attack
Invalid user svn from 14.116.255.229 port 34454
2020-05-28 15:28:49
108.183.151.208 attackspam
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-05-28 15:31:34
167.71.209.43 attackspambots
fail2ban -- 167.71.209.43
...
2020-05-28 15:14:44
91.206.14.169 attackspam
SSH Brute-Force Attack
2020-05-28 15:26:19
1.172.225.152 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-28 15:24:38
14.116.216.176 attackbotsspam
SSH login attempts.
2020-05-28 15:04:21
113.247.250.238 attack
SSH auth scanning - multiple failed logins
2020-05-28 14:51:58
133.242.52.96 attackbotsspam
<6 unauthorized SSH connections
2020-05-28 15:12:58
120.211.61.239 attackbots
$f2bV_matches
2020-05-28 15:00:25
70.37.56.225 attackbotsspam
Invalid user guest from 70.37.56.225 port 57014
2020-05-28 15:26:39
167.71.236.71 attackbotsspam
Total attacks: 2
2020-05-28 14:56:03

Recently Reported IPs

57.251.87.181 139.75.199.108 98.76.160.89 97.95.149.134
212.102.129.205 45.122.26.124 29.229.132.83 77.177.36.112
124.16.82.204 33.111.243.248 42.178.234.61 64.238.126.45
131.137.255.110 76.58.86.189 74.130.127.66 216.85.99.239
14.157.20.166 196.91.215.211 99.50.118.27 227.25.117.122