Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.164.167.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.164.167.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 11:05:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
11.167.164.82.in-addr.arpa domain name pointer 11.167.164.82.customer.cdi.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.167.164.82.in-addr.arpa	name = 11.167.164.82.customer.cdi.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
142.93.178.87 attackspambots
Invalid user xin from 142.93.178.87 port 45450
2019-08-01 00:52:56
182.61.33.2 attackbotsspam
Jun 24 04:26:02 dallas01 sshd[8536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.2
Jun 24 04:26:04 dallas01 sshd[8536]: Failed password for invalid user password@123 from 182.61.33.2 port 39812 ssh2
Jun 24 04:26:56 dallas01 sshd[8650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.33.2
2019-08-01 01:25:07
51.83.70.157 attackspambots
Invalid user web from 51.83.70.157 port 48546
2019-08-01 01:18:31
182.72.124.6 attack
Invalid user odoo from 182.72.124.6 port 47496
2019-08-01 00:48:01
128.199.222.43 attackspambots
Jul 31 14:36:32 www sshd\[15890\]: Invalid user koenraad from 128.199.222.43 port 60282
...
2019-08-01 01:10:47
89.248.174.201 attack
31.07.2019 13:41:43 Connection to port 10210 blocked by firewall
2019-08-01 00:27:36
139.59.59.194 attack
2019-07-31T18:31:41.1664651240 sshd\[15710\]: Invalid user mgeweb from 139.59.59.194 port 59950
2019-07-31T18:31:41.1841821240 sshd\[15710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.194
2019-07-31T18:31:43.4710731240 sshd\[15710\]: Failed password for invalid user mgeweb from 139.59.59.194 port 59950 ssh2
...
2019-08-01 00:53:45
123.16.53.239 attackspambots
Unauthorised access (Jul 31) SRC=123.16.53.239 LEN=52 TTL=115 ID=25083 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-01 01:42:52
78.26.172.117 attackbotsspam
firewall-block, port(s): 23/tcp
2019-08-01 00:58:18
181.40.66.179 attackspam
Jul 31 14:05:54 debian sshd\[18313\]: Invalid user test from 181.40.66.179 port 49222
Jul 31 14:05:54 debian sshd\[18313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.66.179
...
2019-08-01 00:48:43
150.109.196.143 attack
Jul 31 18:17:35 srv03 sshd\[25258\]: Invalid user cap from 150.109.196.143 port 58468
Jul 31 18:17:35 srv03 sshd\[25258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.196.143
Jul 31 18:17:37 srv03 sshd\[25258\]: Failed password for invalid user cap from 150.109.196.143 port 58468 ssh2
2019-08-01 00:35:41
211.252.17.254 attackbots
Invalid user celery from 211.252.17.254 port 53970
2019-08-01 00:44:30
119.90.52.36 attackbotsspam
Jun 29 21:13:59 dallas01 sshd[25139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Jun 29 21:14:02 dallas01 sshd[25139]: Failed password for invalid user Alphanetworks from 119.90.52.36 port 47916 ssh2
Jun 29 21:16:01 dallas01 sshd[25468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.90.52.36
Jun 29 21:16:02 dallas01 sshd[25468]: Failed password for invalid user speech-dispatcher from 119.90.52.36 port 35932 ssh2
2019-08-01 01:12:56
177.69.130.81 attackbotsspam
Invalid user uftp from 177.69.130.81 port 60694
2019-08-01 00:33:10
54.38.156.181 attackbots
Automatic report - Banned IP Access
2019-08-01 01:34:23

Recently Reported IPs

24.89.39.51 174.4.120.59 252.148.191.49 214.152.100.54
247.132.193.54 43.167.210.122 49.4.208.55 98.194.97.123
191.225.133.132 47.150.53.234 18.211.144.246 135.148.107.143
176.131.160.13 57.211.129.210 218.164.62.206 36.46.209.65
249.6.90.82 125.242.183.186 23.217.155.178 190.139.51.2