Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bratislava

Region: Bratislava

Country: Slovakia

Internet Service Provider: UPC Slovensko s.r.o

Hostname: unknown

Organization: Liberty Global B.V.

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
"Unauthorized connection attempt on SSHD detected"
2020-04-24 02:38:22
attack
(sshd) Failed SSH login from 82.119.111.122 (SK/Slovakia/82-119-111-122.static.chello.sk): 5 in the last 3600 secs
2020-04-22 18:15:33
attackbotsspam
detected by Fail2Ban
2020-04-20 14:04:29
attack
Invalid user hhq from 82.119.111.122 port 33354
2020-03-31 19:05:56
attack
Invalid user tab from 82.119.111.122 port 59128
2020-03-21 17:36:32
attackspambots
Jan  9 08:54:20 server sshd\[24154\]: Invalid user rmsssh from 82.119.111.122
Jan  9 08:54:20 server sshd\[24154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-119-111-122.static.chello.sk 
Jan  9 08:54:23 server sshd\[24154\]: Failed password for invalid user rmsssh from 82.119.111.122 port 46998 ssh2
Jan 10 07:58:51 server sshd\[4140\]: Invalid user temp from 82.119.111.122
Jan 10 07:58:51 server sshd\[4140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82-119-111-122.static.chello.sk 
...
2020-01-10 13:16:35
attack
Dec 15 14:50:38 l02a sshd[5088]: Invalid user lebuis from 82.119.111.122
Dec 15 14:50:38 l02a sshd[5088]: Invalid user lebuis from 82.119.111.122
Dec 15 14:50:40 l02a sshd[5088]: Failed password for invalid user lebuis from 82.119.111.122 port 60234 ssh2
2019-12-16 02:22:34
attack
...
2019-12-13 23:48:10
attack
SSH bruteforce
2019-06-29 08:55:54
attackbots
Automatic report - Web App Attack
2019-06-23 15:15:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.119.111.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.119.111.122.			IN	A

;; AUTHORITY SECTION:
.			2615	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019032802 1800 900 604800 86400

;; Query time: 452 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 29 05:16:53 CST 2019
;; MSG SIZE  rcvd: 118

Host info
122.111.119.82.in-addr.arpa domain name pointer 82-119-111-122.static.chello.sk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.111.119.82.in-addr.arpa	name = 82-119-111-122.static.chello.sk.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.93.136.244 attackspam
IP 103.93.136.244 attacked honeypot on port: 81 at 6/24/2020 8:46:58 PM
2020-06-25 20:05:33
116.118.112.85 attackbotsspam
Unauthorized connection attempt from IP address 116.118.112.85 on Port 445(SMB)
2020-06-25 20:22:00
172.81.211.47 attackspam
Failed password for invalid user isis from 172.81.211.47 port 46860 ssh2
2020-06-25 20:26:24
183.220.146.250 attack
web-1 [ssh_2] SSH Attack
2020-06-25 20:10:35
171.7.249.181 attack
1593056827 - 06/25/2020 05:47:07 Host: 171.7.249.181/171.7.249.181 Port: 445 TCP Blocked
2020-06-25 20:03:55
188.131.178.32 attackbots
$f2bV_matches
2020-06-25 19:58:45
51.75.4.79 attack
Jun 25 14:04:40 ns382633 sshd\[8529\]: Invalid user joomla from 51.75.4.79 port 46208
Jun 25 14:04:40 ns382633 sshd\[8529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.4.79
Jun 25 14:04:42 ns382633 sshd\[8529\]: Failed password for invalid user joomla from 51.75.4.79 port 46208 ssh2
Jun 25 14:05:36 ns382633 sshd\[9039\]: Invalid user joomla from 51.75.4.79 port 57614
Jun 25 14:05:36 ns382633 sshd\[9039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.4.79
2020-06-25 20:15:52
84.96.22.25 attackbotsspam
Unauthorized connection attempt from IP address 84.96.22.25 on Port 445(SMB)
2020-06-25 20:25:54
51.158.112.98 attackspambots
Jun 24 09:27:20 xxxxxxx9247313 sshd[9855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.112.98  user=r.r
Jun 24 09:27:21 xxxxxxx9247313 sshd[9855]: Failed password for r.r from 51.158.112.98 port 42084 ssh2
Jun 24 09:31:31 xxxxxxx9247313 sshd[9950]: Invalid user gw from 51.158.112.98
Jun 24 09:31:31 xxxxxxx9247313 sshd[9950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.112.98 
Jun 24 09:31:33 xxxxxxx9247313 sshd[9950]: Failed password for invalid user gw from 51.158.112.98 port 50068 ssh2
Jun 24 09:35:02 xxxxxxx9247313 sshd[9973]: Invalid user netflow from 51.158.112.98
Jun 24 09:35:02 xxxxxxx9247313 sshd[9973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.112.98 
Jun 24 09:35:04 xxxxxxx9247313 sshd[9973]: Failed password for invalid user netflow from 51.158.112.98 port 50582 ssh2
Jun 24 09:38:15 xxxxxxx9247313 sshd[10085]........
------------------------------
2020-06-25 19:59:55
13.67.211.223 attackspam
Unauthorized connection attempt detected from IP address 13.67.211.223 to port 6151
2020-06-25 20:03:35
110.78.181.153 attackspam
Unauthorized connection attempt from IP address 110.78.181.153 on Port 445(SMB)
2020-06-25 20:24:07
49.234.98.155 attackspambots
$f2bV_matches
2020-06-25 20:16:15
51.178.138.1 attackbots
Jun 25 13:13:03 jane sshd[5386]: Failed password for root from 51.178.138.1 port 35768 ssh2
...
2020-06-25 19:45:29
94.102.49.114 attackspambots
 TCP (SYN) 94.102.49.114:58313 -> port 62555, len 44
2020-06-25 20:22:26
50.100.113.207 attack
Invalid user ivan from 50.100.113.207 port 50310
2020-06-25 20:12:03

Recently Reported IPs

113.176.31.59 180.169.225.60 114.67.229.70 113.161.6.86
92.74.62.204 14.161.15.98 206.189.165.31 196.41.88.34
37.195.50.41 115.29.9.88 92.154.98.28 203.74.127.79
121.201.34.97 118.70.146.231 138.201.119.45 43.227.223.8
85.15.46.4 178.76.71.141 13.94.43.10 185.220.102.4