Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.136.212.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28711
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.136.212.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:07:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
11.212.136.82.in-addr.arpa domain name pointer 82-136-212-11.biz.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.212.136.82.in-addr.arpa	name = 82-136-212-11.biz.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.38.175.92 attack
Honeypot attack, port: 81, PTR: 0526AF5C.dsl.pool.telekom.hu.
2020-01-11 05:23:29
52.173.32.248 attackspam
Jan 10 22:11:36 host sshd[63677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.173.32.248  user=root
Jan 10 22:11:38 host sshd[63677]: Failed password for root from 52.173.32.248 port 46316 ssh2
...
2020-01-11 05:30:08
183.134.91.158 attackspam
2020-01-10 22:11:33,262 fail2ban.actions: WARNING [ssh] Ban 183.134.91.158
2020-01-11 05:37:33
54.39.21.54 attack
Jan 10 21:11:33 thevastnessof sshd[21357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.21.54
...
2020-01-11 05:32:46
49.88.112.59 attackspambots
Jan 10 22:24:40 server sshd[14017]: Failed none for root from 49.88.112.59 port 64613 ssh2
Jan 10 22:24:42 server sshd[14017]: Failed password for root from 49.88.112.59 port 64613 ssh2
Jan 10 22:24:45 server sshd[14017]: Failed password for root from 49.88.112.59 port 64613 ssh2
2020-01-11 05:35:26
179.126.33.157 attackspambots
Honeypot attack, port: 445, PTR: 179-126-033-157.xd-dynamic.algarnetsuper.com.br.
2020-01-11 05:46:13
49.88.112.114 attackbots
Jan 10 11:50:27 auw2 sshd\[23741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Jan 10 11:50:29 auw2 sshd\[23741\]: Failed password for root from 49.88.112.114 port 57770 ssh2
Jan 10 11:51:37 auw2 sshd\[23820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Jan 10 11:51:39 auw2 sshd\[23820\]: Failed password for root from 49.88.112.114 port 38061 ssh2
Jan 10 11:51:42 auw2 sshd\[23820\]: Failed password for root from 49.88.112.114 port 38061 ssh2
2020-01-11 05:54:11
36.81.168.197 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-11 05:37:10
222.186.175.155 attackbots
Jan 10 22:39:37 srv206 sshd[5572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Jan 10 22:39:39 srv206 sshd[5572]: Failed password for root from 222.186.175.155 port 22862 ssh2
...
2020-01-11 05:40:01
104.244.79.181 attackbots
2020-01-10T21:11:46.036938hub.schaetter.us sshd\[8836\]: Invalid user fake from 104.244.79.181 port 35770
2020-01-10T21:11:46.045075hub.schaetter.us sshd\[8836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.181
2020-01-10T21:11:48.107455hub.schaetter.us sshd\[8836\]: Failed password for invalid user fake from 104.244.79.181 port 35770 ssh2
2020-01-10T21:11:49.202237hub.schaetter.us sshd\[8838\]: Invalid user admin from 104.244.79.181 port 39398
2020-01-10T21:11:49.210288hub.schaetter.us sshd\[8838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.181
...
2020-01-11 05:17:16
177.155.134.68 attackbotsspam
Unauthorised access (Jan 10) SRC=177.155.134.68 LEN=40 TTL=236 ID=19479 TCP DPT=445 WINDOW=1024 SYN
2020-01-11 05:28:39
61.10.28.30 attack
Honeypot attack, port: 5555, PTR: cm61-10-28-30.hkcable.com.hk.
2020-01-11 05:26:36
46.195.99.25 attackbots
Honeypot attack, port: 5555, PTR: c-2ec36319-74736162.cust.telenor.se.
2020-01-11 05:54:54
52.52.65.106 attack
Automatic report - Port Scan Attack
2020-01-11 05:24:21
77.111.181.93 attackspam
Honeypot attack, port: 81, PTR: h181-93.pool77-111.dyn.tolna.net.
2020-01-11 05:49:42

Recently Reported IPs

178.169.12.124 169.250.102.75 239.25.53.22 21.88.49.169
51.120.169.53 134.109.6.75 211.50.247.8 254.84.146.229
95.4.56.203 152.207.116.3 213.100.220.35 213.169.102.73
2.102.15.53 207.79.172.91 32.239.7.87 66.116.252.9
118.134.227.22 134.148.114.13 250.17.198.37 64.211.173.184