Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Azerbaijan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.194.29.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11143
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.194.29.216.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 05:04:50 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 216.29.194.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.29.194.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
70.33.206.130 attack
20/4/21@23:55:14: FAIL: Alarm-Intrusion address from=70.33.206.130
...
2020-04-22 14:14:10
138.197.195.52 attackbots
Apr 22 07:23:11 cloud sshd[22228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52 
Apr 22 07:23:14 cloud sshd[22228]: Failed password for invalid user ct from 138.197.195.52 port 48852 ssh2
2020-04-22 13:37:08
110.42.6.123 attackbots
20/4/22@01:59:03: FAIL: Alarm-Network address from=110.42.6.123
20/4/22@01:59:03: FAIL: Alarm-Network address from=110.42.6.123
...
2020-04-22 14:07:46
216.188.133.10 attackspambots
/public_html/
2020-04-22 13:36:17
54.39.138.251 attackbots
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-04-22 14:16:52
87.101.72.81 attackbots
Apr 22 07:15:16 meumeu sshd[10758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.101.72.81 
Apr 22 07:15:18 meumeu sshd[10758]: Failed password for invalid user tq from 87.101.72.81 port 36895 ssh2
Apr 22 07:20:43 meumeu sshd[11559]: Failed password for root from 87.101.72.81 port 33060 ssh2
...
2020-04-22 13:40:11
178.62.125.120 attackbotsspam
20/4/22@01:00:36: FAIL: IoT-Telnet address from=178.62.125.120
...
2020-04-22 13:38:46
63.82.48.253 attackspambots
Apr 22 05:24:49 web01.agentur-b-2.de postfix/smtpd[70916]: NOQUEUE: reject: RCPT from seahorse.jdmbrosllc.com[63.82.48.253]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Apr 22 05:25:56 web01.agentur-b-2.de postfix/smtpd[67232]: NOQUEUE: reject: RCPT from seahorse.jdmbrosllc.com[63.82.48.253]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Apr 22 05:29:13 web01.agentur-b-2.de postfix/smtpd[64361]: NOQUEUE: reject: RCPT from seahorse.jdmbrosllc.com[63.82.48.253]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
Apr 22 05:30:42 web01.agentur-b-2.de postfix/sm
2020-04-22 13:58:13
206.189.202.165 attackbots
$f2bV_matches
2020-04-22 14:12:15
91.231.113.113 attackbots
Invalid user nn from 91.231.113.113 port 9548
2020-04-22 14:00:33
84.161.89.58 attackbotsspam
404 NOT FOUND
2020-04-22 14:11:13
72.143.15.82 attackspam
Apr 22 08:44:10 lukav-desktop sshd\[1540\]: Invalid user wr from 72.143.15.82
Apr 22 08:44:10 lukav-desktop sshd\[1540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.143.15.82
Apr 22 08:44:12 lukav-desktop sshd\[1540\]: Failed password for invalid user wr from 72.143.15.82 port 59147 ssh2
Apr 22 08:50:55 lukav-desktop sshd\[1813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.143.15.82  user=root
Apr 22 08:50:57 lukav-desktop sshd\[1813\]: Failed password for root from 72.143.15.82 port 59500 ssh2
2020-04-22 14:11:41
85.209.0.33 attackbots
Unauthorized connection attempt detected from IP address 85.209.0.33 to port 3128
2020-04-22 14:08:18
2002:b9ea:db51::b9ea:db51 attack
Apr 22 06:53:59 web01.agentur-b-2.de postfix/smtpd[86004]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 22 06:53:59 web01.agentur-b-2.de postfix/smtpd[86004]: lost connection after AUTH from unknown[2002:b9ea:db51::b9ea:db51]
Apr 22 07:00:36 web01.agentur-b-2.de postfix/smtpd[86004]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 22 07:00:36 web01.agentur-b-2.de postfix/smtpd[86004]: lost connection after AUTH from unknown[2002:b9ea:db51::b9ea:db51]
Apr 22 07:02:02 web01.agentur-b-2.de postfix/smtpd[84380]: warning: unknown[2002:b9ea:db51::b9ea:db51]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-04-22 13:59:22
218.92.0.201 attackspambots
Automatic report BANNED IP
2020-04-22 14:02:07

Recently Reported IPs

61.52.42.167 219.85.10.238 58.186.60.206 200.236.103.68
42.122.48.169 42.200.153.172 47.243.77.128 118.250.122.67
78.16.1.201 120.86.253.146 95.38.63.146 1.33.206.197
133.240.31.245 175.107.9.88 185.164.253.192 34.152.5.123
222.82.5.137 41.40.177.176 219.146.197.174 42.193.45.112