Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.132.214.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.132.214.42.			IN	A

;; AUTHORITY SECTION:
.			597	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031101 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 03:08:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.214.132.82.in-addr.arpa domain name pointer 82-132-214-42.dab.02.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.214.132.82.in-addr.arpa	name = 82-132-214-42.dab.02.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.68.136.168 attackspam
Automatic report - Banned IP Access
2019-09-27 02:41:11
106.51.72.240 attack
SSH Brute Force, server-1 sshd[30325]: Failed password for invalid user ftpuser from 106.51.72.240 port 52630 ssh2
2019-09-27 02:29:00
42.157.131.201 attackspam
Sep 26 20:37:53 plex sshd[1986]: Invalid user zhao from 42.157.131.201 port 35790
2019-09-27 02:48:46
62.234.141.187 attackspam
Sep 26 15:23:11 dedicated sshd[26241]: Invalid user nagios from 62.234.141.187 port 60648
2019-09-27 02:44:11
36.92.95.10 attackspambots
Sep 26 19:56:44 vps01 sshd[11865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.92.95.10
Sep 26 19:56:46 vps01 sshd[11865]: Failed password for invalid user Robert from 36.92.95.10 port 47135 ssh2
2019-09-27 02:03:00
113.80.86.2 attack
Automatic report - Banned IP Access
2019-09-27 02:27:21
171.241.22.119 attack
Unauthorized connection attempt from IP address 171.241.22.119 on Port 445(SMB)
2019-09-27 02:45:39
167.99.74.119 attackspam
Looking for resource vulnerabilities
2019-09-27 02:15:33
202.108.31.160 attackspambots
Fail2Ban Ban Triggered
2019-09-27 02:21:13
114.112.58.134 attackbots
Sep 26 05:27:30 hpm sshd\[8842\]: Invalid user weblogic from 114.112.58.134
Sep 26 05:27:30 hpm sshd\[8842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.112.58.134
Sep 26 05:27:32 hpm sshd\[8842\]: Failed password for invalid user weblogic from 114.112.58.134 port 39120 ssh2
Sep 26 05:33:50 hpm sshd\[9424\]: Invalid user mint from 114.112.58.134
Sep 26 05:33:50 hpm sshd\[9424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.112.58.134
2019-09-27 02:03:44
139.59.238.188 attackspambots
WordPress wp-login brute force :: 139.59.238.188 0.812 BYPASS [26/Sep/2019:22:34:52  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-27 02:09:58
198.108.67.59 attackspam
" "
2019-09-27 02:37:00
14.185.61.77 attackspam
Unauthorised access (Sep 26) SRC=14.185.61.77 LEN=52 TTL=118 ID=10154 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-27 02:42:28
159.65.176.156 attack
SSH Brute Force, server-1 sshd[30282]: Failed password for invalid user test from 159.65.176.156 port 56735 ssh2
2019-09-27 02:25:21
41.205.196.102 attackbotsspam
SSH Brute Force, server-1 sshd[27021]: Failed password for invalid user szerver from 41.205.196.102 port 52956 ssh2
2019-09-27 02:33:31

Recently Reported IPs

117.254.62.102 117.254.62.104 117.255.223.144 117.255.223.148
117.255.223.150 117.255.223.152 117.255.223.155 117.255.223.156
117.255.223.159 117.26.192.167 34.170.11.140 117.26.193.212
117.26.193.90 117.26.194.92 117.26.194.97 117.26.195.111
117.26.195.113 117.26.195.16 117.26.195.185 117.26.195.196