Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: Free

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.142.63.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.142.63.85.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 15:50:30 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 85.63.142.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.63.142.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.137.252 attack
Dec 28 07:05:25 localhost sshd\[128694\]: Invalid user 1004 from 128.199.137.252 port 56482
Dec 28 07:05:25 localhost sshd\[128694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252
Dec 28 07:05:28 localhost sshd\[128694\]: Failed password for invalid user 1004 from 128.199.137.252 port 56482 ssh2
Dec 28 07:07:44 localhost sshd\[128744\]: Invalid user acklin from 128.199.137.252 port 48276
Dec 28 07:07:44 localhost sshd\[128744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.137.252
...
2019-12-28 15:49:14
91.143.167.153 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 15:36:41
123.148.145.40 attackbots
WP_xmlrpc_attack
2019-12-28 15:27:42
24.126.198.9 attackspam
" "
2019-12-28 15:17:59
119.28.116.223 attackbotsspam
fail2ban honeypot
2019-12-28 15:12:08
110.141.241.164 attackspam
Dec 28 07:29:33 debian-2gb-nbg1-2 kernel: \[1167292.493162\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=110.141.241.164 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x40 TTL=47 ID=56893 PROTO=TCP SPT=65371 DPT=8000 WINDOW=42070 RES=0x00 SYN URGP=0
2019-12-28 15:10:44
181.191.107.18 attackbots
Honeypot attack, port: 23, PTR: 18.0.104.191.181.t2web.com.br.
2019-12-28 15:42:00
218.16.60.210 attackbotsspam
Dec 28 07:29:05 vpn01 sshd[24804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.16.60.210
Dec 28 07:29:07 vpn01 sshd[24804]: Failed password for invalid user squid from 218.16.60.210 port 57864 ssh2
...
2019-12-28 15:30:05
89.177.250.75 attackbotsspam
$f2bV_matches
2019-12-28 15:43:49
106.0.7.201 attack
Unauthorized connection attempt detected from IP address 106.0.7.201 to port 1433
2019-12-28 15:15:56
140.213.16.90 attack
Unauthorized connection attempt detected from IP address 140.213.16.90 to port 445
2019-12-28 15:25:49
101.96.120.31 attackbots
Unauthorized connection attempt from IP address 101.96.120.31 on Port 445(SMB)
2019-12-28 15:06:47
111.231.121.20 attack
Dec 28 08:25:28 vps691689 sshd[31011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.121.20
Dec 28 08:25:30 vps691689 sshd[31011]: Failed password for invalid user oa from 111.231.121.20 port 48632 ssh2
Dec 28 08:29:18 vps691689 sshd[31064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.121.20
...
2019-12-28 15:31:30
200.108.139.242 attackspambots
Dec 28 03:29:13 ldap01vmsma01 sshd[86274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242
Dec 28 03:29:15 ldap01vmsma01 sshd[86274]: Failed password for invalid user alfredo from 200.108.139.242 port 38947 ssh2
...
2019-12-28 15:20:30
118.89.236.107 attackspam
Dec 28 07:29:27 vpn01 sshd[24824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.236.107
Dec 28 07:29:29 vpn01 sshd[24824]: Failed password for invalid user xuan from 118.89.236.107 port 51098 ssh2
...
2019-12-28 15:15:24

Recently Reported IPs

189.90.223.61 237.130.118.165 175.235.177.182 101.151.91.240
74.0.56.154 50.48.145.140 84.67.89.80 201.106.81.105
155.211.94.69 225.249.140.15 97.119.254.155 239.224.104.65
24.55.158.20 181.223.206.12 50.111.5.168 48.57.54.188
188.10.244.146 148.6.169.165 73.168.171.25 164.38.193.24