Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Moscow

Region: Moscow

Country: Russia

Internet Service Provider: Rostelecom

Hostname: unknown

Organization: Rostelecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.149.219.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48022
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.149.219.74.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 01:44:06 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 74.219.149.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 74.219.149.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.144.126.209 attack
Jan 17 18:37:55 ovpn sshd\[23126\]: Invalid user yaroslav from 162.144.126.209
Jan 17 18:37:55 ovpn sshd\[23126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.126.209
Jan 17 18:37:57 ovpn sshd\[23126\]: Failed password for invalid user yaroslav from 162.144.126.209 port 48848 ssh2
Jan 17 18:43:51 ovpn sshd\[24656\]: Invalid user ram from 162.144.126.209
Jan 17 18:43:51 ovpn sshd\[24656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.144.126.209
2020-01-18 03:18:35
77.20.22.120 attackbotsspam
Unauthorized connection attempt detected from IP address 77.20.22.120 to port 2220 [J]
2020-01-18 03:28:47
14.250.122.233 attackspambots
Invalid user avanthi from 14.250.122.233 port 56662
2020-01-18 03:53:08
107.175.87.115 attackspambots
Invalid user admin from 107.175.87.115 port 37431
2020-01-18 03:45:09
118.100.49.236 attackspambots
Jan 17 19:42:59 mail sshd\[19681\]: Invalid user loja from 118.100.49.236
Jan 17 19:42:59 mail sshd\[19681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.100.49.236
Jan 17 19:43:00 mail sshd\[19681\]: Failed password for invalid user loja from 118.100.49.236 port 60432 ssh2
...
2020-01-18 03:23:33
103.243.164.251 attackbots
Jan 18 02:19:26 lcl-usvr-02 sshd[9519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.164.251  user=root
Jan 18 02:19:28 lcl-usvr-02 sshd[9519]: Failed password for root from 103.243.164.251 port 56182 ssh2
Jan 18 02:22:36 lcl-usvr-02 sshd[10281]: Invalid user gretchen from 103.243.164.251 port 54724
Jan 18 02:22:36 lcl-usvr-02 sshd[10281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.164.251
Jan 18 02:22:36 lcl-usvr-02 sshd[10281]: Invalid user gretchen from 103.243.164.251 port 54724
Jan 18 02:22:38 lcl-usvr-02 sshd[10281]: Failed password for invalid user gretchen from 103.243.164.251 port 54724 ssh2
...
2020-01-18 03:47:47
150.136.210.215 attackspambots
Unauthorized connection attempt detected from IP address 150.136.210.215 to port 2220 [J]
2020-01-18 03:40:08
90.188.253.255 attack
Unauthorized connection attempt detected from IP address 90.188.253.255 to port 2220 [J]
2020-01-18 03:49:39
138.201.95.98 attack
Unauthorized connection attempt detected from IP address 138.201.95.98 to port 2220 [J]
2020-01-18 03:20:37
148.63.53.51 attackbotsspam
Unauthorized connection attempt detected from IP address 148.63.53.51 to port 2220 [J]
2020-01-18 03:19:19
150.109.119.96 attackspambots
Jan 15 01:04:37 neweola sshd[16586]: Invalid user mk from 150.109.119.96 port 50018
Jan 15 01:04:37 neweola sshd[16586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.119.96 
Jan 15 01:04:39 neweola sshd[16586]: Failed password for invalid user mk from 150.109.119.96 port 50018 ssh2
Jan 15 01:04:40 neweola sshd[16586]: Received disconnect from 150.109.119.96 port 50018:11: Bye Bye [preauth]
Jan 15 01:04:40 neweola sshd[16586]: Disconnected from invalid user mk 150.109.119.96 port 50018 [preauth]
Jan 15 01:17:56 neweola sshd[17671]: Invalid user audio from 150.109.119.96 port 33028
Jan 15 01:17:56 neweola sshd[17671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.119.96 
Jan 15 01:17:57 neweola sshd[17671]: Failed password for invalid user audio from 150.109.119.96 port 33028 ssh2
Jan 15 01:17:58 neweola sshd[17671]: Received disconnect from 150.109.119.96 port 33028:11: B........
-------------------------------
2020-01-18 03:40:20
95.70.151.242 attack
Unauthorized connection attempt detected from IP address 95.70.151.242 to port 2220 [J]
2020-01-18 03:49:15
202.117.111.133 attackbots
Invalid user anaconda from 202.117.111.133 port 5772
2020-01-18 03:35:02
68.48.240.245 attackspambots
Unauthorized connection attempt detected from IP address 68.48.240.245 to port 2220 [J]
2020-01-18 03:51:04
117.119.86.144 attack
21 attempts against mh-ssh on cloud.magehost.pro
2020-01-18 03:42:48

Recently Reported IPs

187.188.15.196 150.149.1.65 123.186.100.219 27.143.46.148
64.74.149.251 66.11.157.252 58.171.66.223 148.126.56.31
61.33.245.252 173.37.222.92 205.136.29.249 137.88.138.162
52.105.107.170 58.219.143.138 153.159.238.113 58.46.207.121
14.138.105.156 130.47.87.233 54.160.200.98 221.204.226.5