Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kuchl

Region: Salzburg

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.194.130.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.194.130.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 03:31:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
25.130.194.82.in-addr.arpa domain name pointer 82-194-130-25.dyn.cablelink.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
25.130.194.82.in-addr.arpa	name = 82-194-130-25.dyn.cablelink.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.223.26.166 attackbots
Invalid user tq from 89.223.26.166 port 34143
2020-04-21 22:30:53
88.88.171.58 attack
Invalid user rq from 88.88.171.58 port 44845
2020-04-21 22:32:30
51.91.156.199 attackspam
Invalid user yx from 51.91.156.199 port 34970
2020-04-21 22:39:17
52.224.69.165 attack
Invalid user admin from 52.224.69.165 port 30626
2020-04-21 22:38:21
106.38.203.230 attackbotsspam
Invalid user test from 106.38.203.230 port 48527
2020-04-21 22:23:02
203.66.168.81 attackspam
Invalid user ug from 203.66.168.81 port 33712
2020-04-21 23:02:21
218.39.226.115 attack
2020-04-21T15:18:55.410085vps751288.ovh.net sshd\[18410\]: Invalid user em from 218.39.226.115 port 42870
2020-04-21T15:18:55.418419vps751288.ovh.net sshd\[18410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.39.226.115
2020-04-21T15:18:56.922749vps751288.ovh.net sshd\[18410\]: Failed password for invalid user em from 218.39.226.115 port 42870 ssh2
2020-04-21T15:23:15.431268vps751288.ovh.net sshd\[18420\]: Invalid user ip from 218.39.226.115 port 54068
2020-04-21T15:23:15.439992vps751288.ovh.net sshd\[18420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.39.226.115
2020-04-21 22:56:39
187.111.211.14 attack
trying to login to mikrotik from zyxel device
2020-04-21 22:30:20
51.91.79.232 attack
Bruteforce detected by fail2ban
2020-04-21 22:39:55
34.87.83.116 attackbotsspam
Invalid user admin from 34.87.83.116 port 34566
2020-04-21 22:50:33
202.29.226.102 attackspam
Invalid user 666666 from 202.29.226.102 port 61030
2020-04-21 23:03:02
59.49.76.205 attackspambots
Invalid user vyatta from 59.49.76.205 port 26121
2020-04-21 22:37:20
104.211.216.173 attackspambots
5x Failed Password
2020-04-21 22:26:18
14.187.1.163 attack
Invalid user admin from 14.187.1.163 port 44372
2020-04-21 22:52:17
92.51.56.12 attackspam
Invalid user admin from 92.51.56.12 port 46478
2020-04-21 22:30:18

Recently Reported IPs

175.119.148.252 221.77.175.173 205.41.180.206 243.224.166.52
238.77.185.93 47.147.193.196 45.145.85.241 46.2.48.205
133.0.211.13 189.82.88.155 53.0.191.58 125.28.99.58
205.130.181.40 108.142.181.174 65.75.105.193 38.185.129.200
153.10.148.235 148.177.52.83 164.4.120.91 83.137.72.154