Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Get AS

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
08/05/2019-09:13:14.880711 82.194.204.116 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 80
2019-08-05 21:29:01
attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-23 22:48:41
attackbots
1561611926 - 06/27/2019 12:05:26 Host: dhcp-82-194-204-116.loqal.no/82.194.204.116 Port: 23 TCP Blocked
...
2019-06-28 23:10:06
attack
2323/tcp 23/tcp...
[2019-04-25/06-26]53pkt,2pt.(tcp)
2019-06-27 01:18:19
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.194.204.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24683
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.194.204.116.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019043002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed May 01 11:31:27 +08 2019
;; MSG SIZE  rcvd: 118

Host info
116.204.194.82.in-addr.arpa domain name pointer dhcp-82-194-204-116.loqal.no.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
116.204.194.82.in-addr.arpa	name = dhcp-82-194-204-116.loqal.no.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
129.158.112.61 attackspam
07.01.2020 14:03:34 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-01-07 21:53:40
49.88.112.116 attack
Jan  7 14:43:08 localhost sshd\[24257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.116  user=root
Jan  7 14:43:10 localhost sshd\[24257\]: Failed password for root from 49.88.112.116 port 10248 ssh2
Jan  7 14:43:12 localhost sshd\[24257\]: Failed password for root from 49.88.112.116 port 10248 ssh2
2020-01-07 21:47:51
182.71.127.252 attackbots
SSH auth scanning - multiple failed logins
2020-01-07 21:23:26
185.69.185.24 attackbots
Unauthorized connection attempt from IP address 185.69.185.24 on Port 445(SMB)
2020-01-07 21:38:51
77.40.68.78 attack
Jan  7 14:04:10 srv01 postfix/smtpd[28724]: warning: unknown[77.40.68.78]: SASL CRAM-MD5 authentication failed: authentication failure
Jan  7 14:04:10 srv01 postfix/smtpd[28724]: warning: unknown[77.40.68.78]: SASL PLAIN authentication failed: authentication failure
Jan  7 14:04:10 srv01 postfix/smtpd[28724]: warning: unknown[77.40.68.78]: SASL LOGIN authentication failed: authentication failure
...
2020-01-07 21:15:00
14.228.253.138 attackbots
Unauthorized connection attempt from IP address 14.228.253.138 on Port 445(SMB)
2020-01-07 21:46:45
171.101.230.11 attackbotsspam
firewall-block, port(s): 4567/tcp
2020-01-07 21:16:17
203.34.117.5 attack
Unauthorized connection attempt from IP address 203.34.117.5 on Port 445(SMB)
2020-01-07 21:53:09
94.255.130.161 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-01-07 21:28:24
66.181.169.90 attack
Unauthorized connection attempt from IP address 66.181.169.90 on Port 445(SMB)
2020-01-07 21:37:02
195.154.112.212 attack
Unauthorized connection attempt detected from IP address 195.154.112.212 to port 2220 [J]
2020-01-07 21:39:06
58.27.205.230 attack
20/1/7@08:03:42: FAIL: IoT-SSH address from=58.27.205.230
...
2020-01-07 21:41:37
185.176.27.246 attack
Jan  7 14:04:05 debian-2gb-nbg1-2 kernel: \[661563.256900\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.246 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=48083 PROTO=TCP SPT=41416 DPT=7790 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-07 21:18:05
106.12.142.52 attack
Jan  7 14:27:52 plex sshd[28518]: Invalid user smboracle from 106.12.142.52 port 34364
2020-01-07 21:43:22
140.143.199.169 attack
Unauthorized connection attempt detected from IP address 140.143.199.169 to port 2220 [J]
2020-01-07 21:50:09

Recently Reported IPs

186.69.191.121 158.69.243.190 172.255.247.189 37.57.90.48
187.176.7.88 146.185.25.185 93.62.253.232 232.88.244.151
211.21.72.75 49.213.17.33 178.113.77.17 114.112.81.181
177.47.194.98 253.117.72.91 133.25.26.5 103.244.205.42
165.233.154.32 185.91.116.213 150.68.230.124 177.76.225.18