Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.142.100.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.142.100.221.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 11:50:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
221.100.142.82.in-addr.arpa domain name pointer 221.100.142.82.static.b26.cz.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
221.100.142.82.in-addr.arpa	name = 221.100.142.82.static.b26.cz.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
54.36.148.17 attackspam
Automatic report - Banned IP Access
2020-05-16 03:53:17
168.232.198.246 attackbots
May 15 20:16:14 host sshd[30004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-198-246.static.konectivatelecomunicacoes.com.br  user=test
May 15 20:16:16 host sshd[30004]: Failed password for test from 168.232.198.246 port 37790 ssh2
...
2020-05-16 03:34:54
106.53.9.137 attack
Invalid user spadmin from 106.53.9.137 port 54184
2020-05-16 04:11:03
103.219.112.1 attackbots
 TCP (SYN) 103.219.112.1:45800 -> port 21572, len 44
2020-05-16 03:39:34
92.118.160.5 attackspambots
 TCP (SYN) 92.118.160.5:34247 -> port 8333, len 44
2020-05-16 03:40:36
167.114.115.33 attackspambots
Invalid user gmodserver from 167.114.115.33 port 52818
2020-05-16 03:59:40
122.15.91.154 attack
Invalid user lc from 122.15.91.154 port 35150
2020-05-16 04:03:57
175.6.135.122 attackbots
May 15 19:56:42 vps333114 sshd[17330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.135.122
May 15 19:56:44 vps333114 sshd[17330]: Failed password for invalid user tunel from 175.6.135.122 port 55074 ssh2
...
2020-05-16 04:08:52
148.227.227.66 attack
*Port Scan* detected from 148.227.227.66 (MX/Mexico/Sinaloa/Culiacán (Privada del Real)/-). 4 hits in the last 250 seconds
2020-05-16 03:50:26
5.58.119.125 attack
Automatic report - Banned IP Access
2020-05-16 04:02:32
106.54.245.12 attack
Invalid user postgres from 106.54.245.12 port 52178
2020-05-16 03:56:23
139.199.0.28 attackspambots
May 15 21:26:33 sip sshd[19847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.0.28
May 15 21:26:34 sip sshd[19847]: Failed password for invalid user deploy from 139.199.0.28 port 48400 ssh2
May 15 21:32:22 sip sshd[22044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.0.28
2020-05-16 04:07:55
218.92.0.192 attack
May 15 21:34:05 sip sshd[276703]: Failed password for root from 218.92.0.192 port 37735 ssh2
May 15 21:35:07 sip sshd[276727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.192  user=root
May 15 21:35:09 sip sshd[276727]: Failed password for root from 218.92.0.192 port 64398 ssh2
...
2020-05-16 03:43:02
106.13.88.44 attack
21 attempts against mh-ssh on cloud
2020-05-16 03:59:16
34.78.87.135 attackbots
34.78.87.135 - - [15/May/2020:06:19:26 -0600] "GET /util/login.aspx HTTP/1.1" 301 509 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:52.0) Gecko/20100101 Firefox/52.0"
...
2020-05-16 04:09:57

Recently Reported IPs

82.139.187.65 82.141.165.99 82.134.48.49 82.142.10.73
82.146.47.9 82.142.9.212 82.151.123.2 82.151.123.11
82.151.125.175 82.151.125.11 82.151.123.20 82.151.123.99
82.151.125.169 82.151.125.163 82.151.125.212 82.151.125.204
82.151.125.168 82.151.125.206 82.151.125.236 82.151.125.251