Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lillehammer

Region: Innlandet

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.164.235.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.164.235.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 15 14:23:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
75.235.164.82.in-addr.arpa domain name pointer 75.235.164.82.customer.cdi.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.235.164.82.in-addr.arpa	name = 75.235.164.82.customer.cdi.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.109.82.109 attack
sshd: Failed password for invalid user .... from 150.109.82.109 port 45034 ssh2
2020-06-15 18:44:30
182.254.244.109 attackbots
Jun 15 08:00:29 Ubuntu-1404-trusty-64-minimal sshd\[22181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.244.109  user=git
Jun 15 08:00:31 Ubuntu-1404-trusty-64-minimal sshd\[22181\]: Failed password for git from 182.254.244.109 port 56510 ssh2
Jun 15 08:05:45 Ubuntu-1404-trusty-64-minimal sshd\[24409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.244.109  user=root
Jun 15 08:05:47 Ubuntu-1404-trusty-64-minimal sshd\[24409\]: Failed password for root from 182.254.244.109 port 48602 ssh2
Jun 15 08:08:26 Ubuntu-1404-trusty-64-minimal sshd\[25621\]: Invalid user hafiz from 182.254.244.109
Jun 15 08:08:26 Ubuntu-1404-trusty-64-minimal sshd\[25621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.244.109
2020-06-15 18:55:11
120.131.9.167 attack
2020-06-15T11:53:21.784058amanda2.illicoweb.com sshd\[16335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.9.167  user=root
2020-06-15T11:53:23.545873amanda2.illicoweb.com sshd\[16335\]: Failed password for root from 120.131.9.167 port 27906 ssh2
2020-06-15T11:57:01.927224amanda2.illicoweb.com sshd\[16436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.9.167  user=root
2020-06-15T11:57:04.561527amanda2.illicoweb.com sshd\[16436\]: Failed password for root from 120.131.9.167 port 4188 ssh2
2020-06-15T12:00:38.098760amanda2.illicoweb.com sshd\[16708\]: Invalid user arma3 from 120.131.9.167 port 44978
2020-06-15T12:00:38.101453amanda2.illicoweb.com sshd\[16708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.9.167
...
2020-06-15 18:37:06
188.93.235.238 attackspambots
Jun 15 11:51:21 mail sshd\[5634\]: Invalid user acer from 188.93.235.238
Jun 15 11:51:21 mail sshd\[5634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.93.235.238
Jun 15 11:51:24 mail sshd\[5634\]: Failed password for invalid user acer from 188.93.235.238 port 43394 ssh2
...
2020-06-15 18:20:41
49.233.138.118 attack
Jun 15 10:32:09 mail sshd[10022]: Failed password for root from 49.233.138.118 port 59244 ssh2
Jun 15 10:34:42 mail sshd[10382]: Failed password for invalid user ntc from 49.233.138.118 port 52814 ssh2
...
2020-06-15 18:30:55
198.74.98.76 attack
Invalid user kevin from 198.74.98.76 port 44318
2020-06-15 18:38:10
34.69.139.140 attackbotsspam
Jun 15 11:55:13  sshd\[11082\]: User root from 140.139.69.34.bc.googleusercontent.com not allowed because not listed in AllowUsersJun 15 11:55:14  sshd\[11082\]: Failed password for invalid user root from 34.69.139.140 port 53212 ssh2
...
2020-06-15 18:26:40
218.92.0.223 attackbots
Jun 15 12:47:25 fhem-rasp sshd[21832]: Disconnected from 218.92.0.223 port 30724 [preauth]
...
2020-06-15 18:50:28
45.14.44.234 attack
 TCP (SYN) 45.14.44.234:57811 -> port 80, len 40
2020-06-15 18:59:26
195.54.161.15 attackbots
Jun 15 11:41:26 debian-2gb-nbg1-2 kernel: \[14472794.981456\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.161.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=54321 PROTO=TCP SPT=42425 DPT=24 WINDOW=65535 RES=0x00 SYN URGP=0 
Jun 15 11:41:26 debian-2gb-nbg1-2 kernel: \[14472794.992993\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.161.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=42426 DPT=24 WINDOW=65535 RES=0x00 SYN URGP=0 
Jun 15 11:41:26 debian-2gb-nbg1-2 kernel: \[14472795.001742\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.161.15 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=42427 DPT=24 WINDOW=65535 RES=0x00 SYN URGP=0
2020-06-15 18:32:44
111.93.200.50 attackbotsspam
Jun 15 05:48:57 lnxmail61 sshd[26360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.200.50
2020-06-15 18:59:10
200.73.238.250 attack
2020-06-15T06:06:28.5541641495-001 sshd[53902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-250-238-73-200.cm.vtr.net  user=root
2020-06-15T06:06:30.3610021495-001 sshd[53902]: Failed password for root from 200.73.238.250 port 36302 ssh2
2020-06-15T06:10:48.2867401495-001 sshd[54079]: Invalid user kevin from 200.73.238.250 port 36600
2020-06-15T06:10:48.2899411495-001 sshd[54079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pc-250-238-73-200.cm.vtr.net
2020-06-15T06:10:48.2867401495-001 sshd[54079]: Invalid user kevin from 200.73.238.250 port 36600
2020-06-15T06:10:50.7893521495-001 sshd[54079]: Failed password for invalid user kevin from 200.73.238.250 port 36600 ssh2
...
2020-06-15 18:32:10
161.35.104.69 attackspam
161.35.104.69 - - [15/Jun/2020:09:13:21 +0200] "GET /wp-login.php HTTP/1.1" 200 5861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.104.69 - - [15/Jun/2020:09:13:23 +0200] "POST /wp-login.php HTTP/1.1" 200 6112 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
161.35.104.69 - - [15/Jun/2020:09:13:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-15 18:52:58
46.38.145.249 attackbots
Jun 15 11:07:35 blackbee postfix/smtpd\[23795\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure
Jun 15 11:09:08 blackbee postfix/smtpd\[23795\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure
Jun 15 11:10:40 blackbee postfix/smtpd\[23795\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure
Jun 15 11:12:12 blackbee postfix/smtpd\[23795\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure
Jun 15 11:13:42 blackbee postfix/smtpd\[23781\]: warning: unknown\[46.38.145.249\]: SASL LOGIN authentication failed: authentication failure
...
2020-06-15 18:21:37
77.40.2.26 attack
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-06-15 18:34:01

Recently Reported IPs

212.173.182.130 71.188.61.127 127.179.77.174 253.234.9.208
148.10.238.49 136.207.144.156 144.172.204.109 226.109.74.91
137.226.146.209 51.168.15.173 78.216.146.82 237.232.21.152
226.35.198.184 21.127.0.16 107.231.48.170 91.147.96.166
6.239.58.103 90.125.63.191 63.248.244.224 116.151.109.117