Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.105.105.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5206
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.105.105.168.			IN	A

;; AUTHORITY SECTION:
.			559	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102901 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 30 09:06:07 CST 2019
;; MSG SIZE  rcvd: 118
Host info
168.105.105.82.in-addr.arpa domain name pointer host168-105-static.105-82-b.business.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.105.105.82.in-addr.arpa	name = host168-105-static.105-82-b.business.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.204.39.194 attack
Aug  1 17:27:47 MK-Soft-VM6 sshd\[10114\]: Invalid user lee from 129.204.39.194 port 60836
Aug  1 17:27:47 MK-Soft-VM6 sshd\[10114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.39.194
Aug  1 17:27:49 MK-Soft-VM6 sshd\[10114\]: Failed password for invalid user lee from 129.204.39.194 port 60836 ssh2
...
2019-08-02 07:23:56
190.24.150.153 attack
Unauthorised access (Aug  1) SRC=190.24.150.153 LEN=52 TTL=117 ID=22360 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-02 06:50:49
106.13.4.150 attackbotsspam
Automatic report - Banned IP Access
2019-08-02 07:18:30
66.228.29.99 attack
Automatic report - Banned IP Access
2019-08-02 06:49:05
212.47.228.121 attack
xmlrpc attack
2019-08-02 06:48:48
112.73.93.180 attackbotsspam
Aug  1 23:31:06 yesfletchmain sshd\[1342\]: Invalid user nie from 112.73.93.180 port 33635
Aug  1 23:31:06 yesfletchmain sshd\[1342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.73.93.180
Aug  1 23:31:09 yesfletchmain sshd\[1342\]: Failed password for invalid user nie from 112.73.93.180 port 33635 ssh2
Aug  1 23:38:36 yesfletchmain sshd\[1460\]: Invalid user shipping from 112.73.93.180 port 34269
Aug  1 23:38:36 yesfletchmain sshd\[1460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.73.93.180
...
2019-08-02 06:55:30
49.83.118.144 attack
Aug  1 08:47:47 hurricane sshd[7674]: Bad protocol version identification '' from 49.83.118.144 port 46407
Aug  1 08:47:49 hurricane sshd[7675]: Invalid user pi from 49.83.118.144 port 46613
Aug  1 08:47:49 hurricane sshd[7675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.118.144
Aug  1 08:47:51 hurricane sshd[7675]: Failed password for invalid user pi from 49.83.118.144 port 46613 ssh2
Aug  1 08:47:52 hurricane sshd[7675]: Connection closed by 49.83.118.144 port 46613 [preauth]
Aug  1 08:47:54 hurricane sshd[7677]: Invalid user pi from 49.83.118.144 port 47188
Aug  1 08:47:54 hurricane sshd[7677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.118.144


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.83.118.144
2019-08-02 07:23:28
104.248.229.8 attack
Aug  1 14:27:04 srv1 sshd[32597]: Invalid user frida from 104.248.229.8
Aug  1 14:27:04 srv1 sshd[32597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.229.8 
Aug  1 14:27:06 srv1 sshd[32597]: Failed password for invalid user frida from 104.248.229.8 port 43890 ssh2
Aug  1 14:27:06 srv1 sshd[32597]: Received disconnect from 104.248.229.8: 11: Bye Bye [preauth]
Aug  1 14:36:52 srv1 sshd[1184]: Invalid user joseph from 104.248.229.8
Aug  1 14:36:52 srv1 sshd[1184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.229.8 
Aug  1 14:36:54 srv1 sshd[1184]: Failed password for invalid user joseph from 104.248.229.8 port 55354 ssh2
Aug  1 14:36:54 srv1 sshd[1184]: Received disconnect from 104.248.229.8: 11: Bye Bye [preauth]
Aug  1 14:41:01 srv1 sshd[1637]: Invalid user akbar from 104.248.229.8
Aug  1 14:41:01 srv1 sshd[1637]: pam_unix(sshd:auth): authentication failure; logname= ui........
-------------------------------
2019-08-02 07:27:02
110.164.180.254 attackspambots
Triggered by Fail2Ban
2019-08-02 06:54:58
62.210.143.217 attackspambots
Aug  1 12:48:20 srv00 sshd[8582]: fatal: Unable to negotiate whostnameh 62.210.143.217 port 59601: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  1 12:48:28 srv00 sshd[8584]: fatal: Unable to negotiate whostnameh 62.210.143.217 port 4062: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  1 12:48:35 srv00 sshd[8586]: fatal: Unable to negotiate whostnameh 62.210.143.217 port 12488: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug  1 12:48:41 srv00 sshd[8588]: fatal: Unable to negotiate whostnameh 62.210.143.217 port 20937: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-grou........
------------------------------
2019-08-02 07:25:20
3.9.164.91 attackspam
Triggered by Fail2Ban
2019-08-02 06:54:02
145.102.6.55 attack
Port scan on 1 port(s): 53
2019-08-02 06:55:54
157.230.144.158 attack
Aug  1 19:07:29 debian sshd\[31536\]: Invalid user mailer from 157.230.144.158 port 42818
Aug  1 19:07:29 debian sshd\[31536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.144.158
Aug  1 19:07:30 debian sshd\[31536\]: Failed password for invalid user mailer from 157.230.144.158 port 42818 ssh2
...
2019-08-02 07:22:56
128.199.154.60 attackspam
Aug  1 15:12:11 * sshd[8948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.154.60
Aug  1 15:12:13 * sshd[8948]: Failed password for invalid user mas from 128.199.154.60 port 53284 ssh2
2019-08-02 07:13:30
213.32.69.98 attackbots
Automatic report - Banned IP Access
2019-08-02 07:21:56

Recently Reported IPs

91.241.182.187 153.104.29.54 85.98.92.13 166.61.151.135
186.233.124.86 16.80.157.126 196.57.19.255 163.78.70.130
9.84.241.40 47.182.164.241 89.62.16.139 167.39.39.249
91.127.183.40 155.18.222.46 200.167.46.153 255.24.83.181
65.173.74.59 35.23.189.255 0.93.146.4 80.2.240.51