Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.180.126.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.180.126.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:38:42 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.126.180.82.in-addr.arpa domain name pointer subs.wemacom.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.126.180.82.in-addr.arpa	name = subs.wemacom.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.193.220.6 attack
Aug  3 08:01:11 piServer sshd[2725]: Failed password for root from 200.193.220.6 port 42530 ssh2
Aug  3 08:03:40 piServer sshd[3102]: Failed password for root from 200.193.220.6 port 44872 ssh2
...
2020-08-03 16:52:27
178.128.89.86 attackspam
Aug  3 05:43:28 melroy-server sshd[23383]: Failed password for root from 178.128.89.86 port 34510 ssh2
...
2020-08-03 16:54:34
122.51.91.131 attackbots
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-03 17:15:11
122.252.234.203 attackbots
Unauthorized connection attempt detected from IP address 122.252.234.203 to port 445
2020-08-03 16:38:25
175.161.13.148 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-03 16:40:55
123.26.20.127 attackbotsspam
1596426710 - 08/03/2020 05:51:50 Host: 123.26.20.127/123.26.20.127 Port: 445 TCP Blocked
2020-08-03 17:00:10
167.99.51.159 attackspambots
Aug  3 10:51:25 mout sshd[30235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.51.159  user=root
Aug  3 10:51:27 mout sshd[30235]: Failed password for root from 167.99.51.159 port 48282 ssh2
2020-08-03 17:10:44
125.137.227.71 attackbots
Unauthorized connection attempt detected from IP address 125.137.227.71 to port 9530
2020-08-03 16:47:08
185.220.103.5 attackspambots
Aug  3 09:04:53 vpn01 sshd[20190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.5
Aug  3 09:04:55 vpn01 sshd[20190]: Failed password for invalid user admin from 185.220.103.5 port 56394 ssh2
...
2020-08-03 17:04:10
65.49.20.67 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-03 16:46:00
74.97.19.201 attack
Unauthorized connection attempt detected from IP address 74.97.19.201 to port 22
2020-08-03 16:50:16
51.89.149.241 attack
fail2ban -- 51.89.149.241
...
2020-08-03 17:10:31
182.208.185.213 attackspambots
Aug  3 06:22:27 abendstille sshd\[26544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.185.213  user=root
Aug  3 06:22:29 abendstille sshd\[26544\]: Failed password for root from 182.208.185.213 port 42070 ssh2
Aug  3 06:26:20 abendstille sshd\[30524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.185.213  user=root
Aug  3 06:26:22 abendstille sshd\[30524\]: Failed password for root from 182.208.185.213 port 43928 ssh2
Aug  3 06:30:08 abendstille sshd\[1673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.208.185.213  user=root
...
2020-08-03 17:12:35
67.205.133.226 attack
[03/Aug/2020:05:51:46 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-03 17:05:55
187.58.65.21 attack
Aug  3 07:52:37 *** sshd[7647]: User root from 187.58.65.21 not allowed because not listed in AllowUsers
2020-08-03 17:14:51

Recently Reported IPs

101.34.240.203 210.59.67.172 201.97.251.185 38.25.20.54
124.219.44.132 159.183.111.148 234.17.55.244 215.85.86.189
95.40.196.43 179.229.219.100 84.121.114.81 119.62.67.224
227.62.9.168 200.120.20.114 76.15.247.22 150.44.243.241
66.73.151.54 8.49.42.84 21.58.251.72 94.253.82.22