Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
67.213.82.137 attackbotsspam
Automatic report - Banned IP Access
2020-09-24 23:28:59
67.213.82.137 attackspam
Automatic report - Banned IP Access
2020-09-24 15:15:49
67.213.82.137 attackspam
Automatic report - Banned IP Access
2020-09-24 06:41:57
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       67.213.82.0 - 67.213.86.255
CIDR:           67.213.84.0/23, 67.213.82.0/23, 67.213.86.0/24
NetName:        SPDNETWORK-03
NetHandle:      NET-67-213-82-0-1
Parent:         NET67 (NET-67-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   1651884 Ontario Inc. (SPDNE)
RegDate:        2007-09-07
Updated:        2018-12-07
Ref:            https://rdap.arin.net/registry/ip/67.213.82.0


OrgName:        1651884 Ontario Inc.
OrgId:          SPDNE
Address:        6013 - 25 Crouse Rd
City:           TORONTO
StateProv:      ON
PostalCode:     M1R 5P8
Country:        CA
RegDate:        2006-06-05
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/SPDNE


OrgTechHandle: SUPPO190-ARIN
OrgTechName:   SPDNETWORK SUPPORT
OrgTechPhone:  +1-212-960-3388 
OrgTechEmail:  SUPPORT@spdnetwork.net
OrgTechRef:    https://rdap.arin.net/registry/entity/SUPPO190-ARIN

OrgAbuseHandle: SUPPO190-ARIN
OrgAbuseName:   SPDNETWORK SUPPORT
OrgAbusePhone:  +1-212-960-3388 
OrgAbuseEmail:  SUPPORT@spdnetwork.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SUPPO190-ARIN

RTechHandle: SUPPO190-ARIN
RTechName:   SPDNETWORK SUPPORT
RTechPhone:  +1-212-960-3388 
RTechEmail:  SUPPORT@spdnetwork.net
RTechRef:    https://rdap.arin.net/registry/entity/SUPPO190-ARIN

RAbuseHandle: ABUSE1233-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-212-960-3388 
RAbuseEmail:  ABUSE@spdnetwork.net
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE1233-ARIN

RNOCHandle: SUPPO190-ARIN
RNOCName:   SPDNETWORK SUPPORT
RNOCPhone:  +1-212-960-3388 
RNOCEmail:  SUPPORT@spdnetwork.net
RNOCRef:    https://rdap.arin.net/registry/entity/SUPPO190-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.213.82.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.213.82.18.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012900 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 00:30:07 CST 2026
;; MSG SIZE  rcvd: 105
Host info
18.82.213.67.in-addr.arpa domain name pointer vps1891.baseservers.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.82.213.67.in-addr.arpa	name = vps1891.baseservers.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
1.171.90.167 attack
20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167
20/2/16@08:41:39: FAIL: Alarm-Network address from=1.171.90.167
...
2020-02-17 06:29:15
175.136.49.5 attack
GET /wp-login.php HTTP/1.1
2020-02-17 06:20:08
189.209.165.113 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:35:25
189.209.164.88 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:40:38
222.186.173.142 attack
Feb 16 22:02:09 hcbbdb sshd\[32085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Feb 16 22:02:10 hcbbdb sshd\[32085\]: Failed password for root from 222.186.173.142 port 37392 ssh2
Feb 16 22:02:32 hcbbdb sshd\[32115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Feb 16 22:02:35 hcbbdb sshd\[32115\]: Failed password for root from 222.186.173.142 port 60634 ssh2
Feb 16 22:02:51 hcbbdb sshd\[32115\]: Failed password for root from 222.186.173.142 port 60634 ssh2
2020-02-17 06:11:31
184.167.140.242 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:12:58
184.161.114.69 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:21:42
81.136.255.20 attackspam
$f2bV_matches
2020-02-17 06:13:16
41.221.168.167 attackspambots
Feb 16 16:54:57 ws22vmsma01 sshd[23554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
Feb 16 16:54:59 ws22vmsma01 sshd[23554]: Failed password for invalid user cvsroot from 41.221.168.167 port 37317 ssh2
...
2020-02-17 06:25:07
184.174.170.78 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 06:11:50
101.127.0.153 attack
wp-login.php
2020-02-17 06:27:03
14.244.103.191 attackspam
1581860500 - 02/16/2020 14:41:40 Host: 14.244.103.191/14.244.103.191 Port: 445 TCP Blocked
2020-02-17 06:28:57
84.163.245.135 attack
SSH Brute-Force reported by Fail2Ban
2020-02-17 06:15:42
185.175.93.105 attackbotsspam
Feb 16 23:47:35 h2177944 kernel: \[5091173.596979\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=35683 PROTO=TCP SPT=40424 DPT=11626 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 23:47:35 h2177944 kernel: \[5091173.596993\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=35683 PROTO=TCP SPT=40424 DPT=11626 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 23:48:10 h2177944 kernel: \[5091208.069541\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=4270 PROTO=TCP SPT=40424 DPT=11075 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 23:48:10 h2177944 kernel: \[5091208.069556\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=4270 PROTO=TCP SPT=40424 DPT=11075 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb 16 23:48:49 h2177944 kernel: \[5091247.305692\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.175.93.105 DST=85.21
2020-02-17 06:52:14
129.211.87.221 attackbots
Feb 16 17:53:53 MK-Soft-VM3 sshd[1262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.87.221 
Feb 16 17:53:56 MK-Soft-VM3 sshd[1262]: Failed password for invalid user az from 129.211.87.221 port 60788 ssh2
...
2020-02-17 06:24:35

Recently Reported IPs

111.53.23.59 84.234.96.159 81.70.185.61 192.71.12.181
165.22.222.13 117.35.182.147 39.100.70.23 20.84.117.189
199.45.155.67 77.237.68.140 66.249.76.234 44.234.121.207
107.170.17.98 45.83.21.240 203.208.187.69 45.83.21.42
85.217.140.6 100.53.127.71 18.97.19.246 159.203.115.22