Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hook

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '82.108.92.0 - 82.108.95.255'

% Abuse contact for '82.108.92.0 - 82.108.95.255' is 'abuse@gtt.net'

inetnum:        82.108.92.0 - 82.108.95.255
netname:        LT-CODE200-GTT
country:        GB
admin-c:        ET6133-RIPE
tech-c:         JC12505-RIPE
status:         SUB-ALLOCATED PA
mnt-by:         AS3257-IPAM-MNT
mnt-by:         mnt-lt-code200-1
created:        2026-03-17T10:09:06Z
last-modified:  2026-03-17T10:09:06Z
source:         RIPE

person:         Egle Trumpulyte
address:        Gostauto 40A, Vilnius, Lithuania
phone:          +370 691 31338
nic-hdl:        ET6133-RIPE
mnt-by:         AS3257-IPAM-MNT
created:        2025-05-15T07:37:36Z
last-modified:  2025-05-15T07:37:36Z
source:         RIPE # Filtered

person:         Julius Cicenas
address:        Gostauto 40A, Vilnius, Lithuania
phone:          +370 5 207-8174
nic-hdl:        JC12505-RIPE
mnt-by:         AS3257-IPAM-MNT
created:        2025-05-15T07:38:53Z
last-modified:  2025-05-15T07:38:53Z
source:         RIPE # Filtered

% Information related to '82.108.92.0/22AS2856'

route:          82.108.92.0/22
origin:         AS2856
created:        2026-03-26T14:29:53Z
last-modified:  2026-03-26T14:29:53Z
source:         RIPE
mnt-by:         AS3257-IPAM-MNT

% This query was served by the RIPE Database Query Service version 1.122 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.108.93.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49755
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.108.93.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 03 16:49:23 CST 2026
;; MSG SIZE  rcvd: 105
Host info
b'Host 82.93.108.82.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 82.108.93.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.33.207.126 attack
Unauthorized connection attempt from IP address 157.33.207.126 on Port 445(SMB)
2020-06-26 07:58:52
188.19.191.9 attack
23/tcp
[2020-06-25]1pkt
2020-06-26 08:14:49
79.124.62.66 attack
Jun 26 01:28:42 debian-2gb-nbg1-2 kernel: \[15386381.763435\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.66 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=26940 PROTO=TCP SPT=44604 DPT=3383 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-26 08:16:38
52.42.2.56 attack
Brute force VPN server
2020-06-26 08:00:31
78.134.99.105 attackspam
Jun 25 23:06:10 abendstille sshd\[30837\]: Invalid user qxn from 78.134.99.105
Jun 25 23:06:10 abendstille sshd\[30837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.134.99.105
Jun 25 23:06:12 abendstille sshd\[30837\]: Failed password for invalid user qxn from 78.134.99.105 port 52864 ssh2
Jun 25 23:06:35 abendstille sshd\[31306\]: Invalid user manuel from 78.134.99.105
Jun 25 23:06:35 abendstille sshd\[31306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.134.99.105
...
2020-06-26 08:46:47
203.195.175.47 attackspam
Unauthorized access to SSH at 25/Jun/2020:21:39:52 +0000.
2020-06-26 07:57:37
122.152.208.242 attack
Ssh brute force
2020-06-26 08:11:07
153.180.22.175 attackbotsspam
20/6/25@16:45:06: FAIL: Alarm-Intrusion address from=153.180.22.175
...
2020-06-26 08:19:55
54.38.158.17 attack
SSH Honeypot -> SSH Bruteforce / Login
2020-06-26 08:26:24
40.123.48.71 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-26 08:34:36
54.37.163.11 attackspambots
2020-06-25T23:07:17.375299shield sshd\[6148\]: Invalid user wangfeng from 54.37.163.11 port 53060
2020-06-25T23:07:17.378891shield sshd\[6148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip11.ip-54-37-163.eu
2020-06-25T23:07:19.563089shield sshd\[6148\]: Failed password for invalid user wangfeng from 54.37.163.11 port 53060 ssh2
2020-06-25T23:09:08.782715shield sshd\[6445\]: Invalid user h from 54.37.163.11 port 57386
2020-06-25T23:09:08.786515shield sshd\[6445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip11.ip-54-37-163.eu
2020-06-26 08:26:50
45.4.189.33 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-26 08:02:22
37.209.192.2 attackspambots
Auto report: unwanted ports scan
2020-06-26 08:27:04
52.155.104.217 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-26 08:40:06
47.88.10.104 attackspam
Port scan on 1 port(s): 53
2020-06-26 08:08:30

Recently Reported IPs

187.123.213.251 145.76.190.74 155.65.52.9 192.36.109.123
192.36.109.104 85.217.140.45 172.236.117.71 91.230.168.68
91.230.168.150 43.162.95.192 110.77.248.195 2606:4700:10::6816:1544
2606:4700:10::6814:8916 77.247.16.23 109.198.233.107 66.132.186.169
5.28.96.201 2606:4700:10::ac43:2224 2606:4700:10::ac43:1003 58.246.155.87