Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.149.97.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.149.97.130.			IN	A

;; AUTHORITY SECTION:
.			152	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:10:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
130.97.149.82.in-addr.arpa domain name pointer cablend-82-149-97-130.static.bnet.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.97.149.82.in-addr.arpa	name = cablend-82-149-97-130.static.bnet.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.71 attack
Jul 24 18:43:38 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2
Jul 24 18:43:42 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2
Jul 24 18:43:47 icinga sshd[25614]: Failed password for root from 49.88.112.71 port 57202 ssh2
...
2019-07-25 03:20:39
95.215.244.62 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-24]9pkt,1pt.(tcp)
2019-07-25 03:04:41
170.130.187.18 attackspam
3389/tcp 8444/tcp 23/tcp...
[2019-06-28/07-24]13pkt,8pt.(tcp),1pt.(udp)
2019-07-25 03:43:34
188.166.72.240 attackbots
2019-07-24T17:52:33.950657abusebot-4.cloudsearch.cf sshd\[4944\]: Invalid user test5 from 188.166.72.240 port 47512
2019-07-25 03:19:29
139.162.127.127 attackspambots
" "
2019-07-25 03:40:22
45.13.39.123 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-25 03:13:42
77.39.9.14 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-24/07-24]25pkt,1pt.(tcp)
2019-07-25 02:55:35
27.79.197.180 attackbots
Brute force attempt
2019-07-25 03:02:01
89.45.205.110 attackspambots
Invalid user www from 89.45.205.110 port 41074
2019-07-25 02:54:31
77.247.109.39 attackspambots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-25 03:37:36
158.69.112.178 attack
fail2ban honeypot
2019-07-25 03:23:44
124.156.241.29 attackspambots
8887/tcp 1830/tcp 6669/tcp...
[2019-07-12/24]4pkt,3pt.(tcp),1pt.(udp)
2019-07-25 03:42:38
82.64.9.197 attack
Automatic report - Banned IP Access
2019-07-25 03:08:25
195.154.199.185 attackspam
CloudCIX Reconnaissance Scan Detected, PTR: 195-154-199-185.rev.poneytelecom.eu.
2019-07-25 03:14:36
188.208.138.111 attack
Jul 24 19:45:21 srv-4 sshd\[14141\]: Invalid user admin from 188.208.138.111
Jul 24 19:45:21 srv-4 sshd\[14141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.208.138.111
Jul 24 19:45:23 srv-4 sshd\[14141\]: Failed password for invalid user admin from 188.208.138.111 port 42603 ssh2
...
2019-07-25 03:02:21

Recently Reported IPs

146.159.195.169 91.145.187.231 176.24.246.158 62.201.149.1
127.77.26.53 10.109.64.83 200.170.217.241 27.15.167.211
108.127.17.95 250.2.189.235 112.76.12.48 17.78.133.87
174.61.99.153 27.161.120.243 138.126.119.140 197.128.165.66
10.183.43.195 226.251.147.15 101.75.49.205 253.190.144.212