Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.131.12.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.131.12.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:46:55 CST 2025
;; MSG SIZE  rcvd: 106
Host info
142.12.131.82.in-addr.arpa domain name pointer 82-131-12-142.ip.elisa.ee.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.12.131.82.in-addr.arpa	name = 82-131-12-142.ip.elisa.ee.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
170.106.76.4 attackspam
Unauthorized connection attempt detected from IP address 170.106.76.4 to port 2121 [J]
2020-01-28 02:57:20
138.68.242.220 attackspam
Unauthorized connection attempt detected from IP address 138.68.242.220 to port 2220 [J]
2020-01-28 02:48:13
1.54.48.195 attack
" "
2020-01-28 02:50:38
212.92.117.185 attackspam
Unauthorized connection attempt detected from IP address 212.92.117.185 to port 3389 [J]
2020-01-28 02:23:47
138.197.180.102 attackbotsspam
Unauthorized connection attempt detected from IP address 138.197.180.102 to port 2220 [J]
2020-01-28 02:53:54
103.110.89.148 attackbots
2020-01-27T18:34:25.411924shield sshd\[28449\]: Invalid user spamd from 103.110.89.148 port 49814
2020-01-27T18:34:25.419098shield sshd\[28449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.89.148
2020-01-27T18:34:27.392447shield sshd\[28449\]: Failed password for invalid user spamd from 103.110.89.148 port 49814 ssh2
2020-01-27T18:37:28.817942shield sshd\[29475\]: Invalid user test from 103.110.89.148 port 45182
2020-01-27T18:37:28.821470shield sshd\[29475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.89.148
2020-01-28 02:45:51
222.186.42.155 attack
Jan 28 00:20:39 areeb-Workstation sshd[10758]: Failed password for root from 222.186.42.155 port 41472 ssh2
Jan 28 00:20:42 areeb-Workstation sshd[10758]: Failed password for root from 222.186.42.155 port 41472 ssh2
...
2020-01-28 02:51:09
159.65.41.104 attackbotsspam
'Fail2Ban'
2020-01-28 02:24:41
93.23.63.130 attackbots
2019-09-23 13:25:02 1iCMSh-0007X6-EI SMTP connection from 130.63.23.93.rev.sfr.net \[93.23.63.130\]:27323 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 13:25:27 1iCMT4-0007ZA-T3 SMTP connection from 130.63.23.93.rev.sfr.net \[93.23.63.130\]:27422 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-09-23 13:25:41 1iCMTL-0007ZN-3X SMTP connection from 130.63.23.93.rev.sfr.net \[93.23.63.130\]:27485 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 02:48:38
93.35.181.106 attack
2019-03-11 20:22:50 H=93-35-181-106.ip56.fastwebnet.it \[93.35.181.106\]:58000 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 20:23:06 H=93-35-181-106.ip56.fastwebnet.it \[93.35.181.106\]:58158 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-11 20:23:18 H=93-35-181-106.ip56.fastwebnet.it \[93.35.181.106\]:58263 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-28 02:42:35
50.194.184.110 attackspam
Unauthorized connection attempt detected from IP address 50.194.184.110 to port 23 [J]
2020-01-28 02:17:04
81.30.200.215 attackbotsspam
Unauthorized connection attempt from IP address 81.30.200.215 on Port 445(SMB)
2020-01-28 02:35:54
59.180.229.249 attackspambots
Unauthorized connection attempt from IP address 59.180.229.249 on Port 445(SMB)
2020-01-28 02:20:43
93.22.154.119 attackbotsspam
2019-07-08 01:07:51 1hkGG2-0005Et-RL SMTP connection from 119.154.22.93.rev.sfr.net \[93.22.154.119\]:14735 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 01:08:44 1hkGGq-0005FS-JA SMTP connection from 119.154.22.93.rev.sfr.net \[93.22.154.119\]:14988 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 01:09:13 1hkGHN-0005Hk-F4 SMTP connection from 119.154.22.93.rev.sfr.net \[93.22.154.119\]:15112 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 02:54:24
43.226.148.31 attackbotsspam
Jan 27 19:25:02 meumeu sshd[4864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.148.31 
Jan 27 19:25:05 meumeu sshd[4864]: Failed password for invalid user recepcao from 43.226.148.31 port 34709 ssh2
Jan 27 19:29:51 meumeu sshd[5960]: Failed password for root from 43.226.148.31 port 46316 ssh2
...
2020-01-28 02:38:01

Recently Reported IPs

172.158.11.253 241.146.151.31 221.53.96.70 128.199.67.169
122.228.200.223 239.112.148.83 122.108.214.215 190.231.250.180
244.132.247.235 243.220.149.58 235.234.239.226 133.87.151.55
174.168.132.0 153.40.25.185 209.240.249.170 92.131.43.124
247.155.37.45 90.12.195.138 81.185.146.240 25.123.199.183