Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Venda do Pinheiro

Region: Lisbon

Country: Portugal

Internet Service Provider: MEO

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.154.7.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.154.7.112.			IN	A

;; AUTHORITY SECTION:
.			445	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071702 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 18 07:55:16 CST 2020
;; MSG SIZE  rcvd: 116
Host info
112.7.154.82.in-addr.arpa domain name pointer bl5-7-112.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
112.7.154.82.in-addr.arpa	name = bl5-7-112.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.229.165.145 attackspam
Unauthorized connection attempt from IP address 101.229.165.145 on Port 445(SMB)
2019-10-19 22:54:24
187.176.190.3 attackspambots
Automatic report - Port Scan Attack
2019-10-19 22:37:24
79.161.218.122 attackspambots
Automatic report - Banned IP Access
2019-10-19 22:34:20
145.239.107.251 attackbots
port scan and connect, tcp 80 (http)
2019-10-19 22:48:17
104.248.170.45 attack
web-1 [ssh] SSH Attack
2019-10-19 22:16:03
91.121.249.166 attackspam
10/19/2019-14:02:18.523710 91.121.249.166 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-19 22:44:12
51.91.218.189 attack
Oct 19 16:03:23 MK-Soft-VM5 sshd[10435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.218.189 
Oct 19 16:03:25 MK-Soft-VM5 sshd[10435]: Failed password for invalid user Betong-ER from 51.91.218.189 port 58424 ssh2
...
2019-10-19 22:44:37
182.74.209.58 attackbotsspam
Unauthorized connection attempt from IP address 182.74.209.58 on Port 445(SMB)
2019-10-19 22:28:39
103.97.215.150 attack
Unauthorized connection attempt from IP address 103.97.215.150 on Port 445(SMB)
2019-10-19 22:47:58
59.51.166.180 attack
IMAP brute force
...
2019-10-19 22:28:09
185.40.13.204 attack
TCP Port: 25 _    invalid blocked  abuseat-org also zen-spamhaus _  _  _ _ (1018)
2019-10-19 22:15:21
103.37.181.221 attack
Unauthorized connection attempt from IP address 103.37.181.221 on Port 445(SMB)
2019-10-19 22:16:56
223.207.247.111 attackspam
Unauthorized connection attempt from IP address 223.207.247.111 on Port 445(SMB)
2019-10-19 22:36:29
139.59.59.194 attackspam
Oct 19 01:57:49 eddieflores sshd\[18245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.194  user=root
Oct 19 01:57:51 eddieflores sshd\[18245\]: Failed password for root from 139.59.59.194 port 44486 ssh2
Oct 19 02:02:23 eddieflores sshd\[18621\]: Invalid user temp from 139.59.59.194
Oct 19 02:02:23 eddieflores sshd\[18621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.194
Oct 19 02:02:25 eddieflores sshd\[18621\]: Failed password for invalid user temp from 139.59.59.194 port 55624 ssh2
2019-10-19 22:35:03
212.156.92.194 attack
Unauthorized connection attempt from IP address 212.156.92.194 on Port 445(SMB)
2019-10-19 22:42:09

Recently Reported IPs

88.174.206.240 195.120.39.29 182.114.102.194 45.72.19.111
151.30.186.48 45.72.113.208 63.192.0.41 17.237.76.2
205.168.77.73 223.191.235.208 187.173.155.132 95.84.228.227
23.236.219.196 121.183.90.149 173.247.24.112 174.195.196.44
183.171.103.197 64.231.29.2 165.22.211.212 31.233.87.252