Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.253.42.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.253.42.166.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 13:09:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
166.42.253.82.in-addr.arpa domain name pointer lns-bzn-37-82-253-42-166.adsl.proxad.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
166.42.253.82.in-addr.arpa	name = lns-bzn-37-82-253-42-166.adsl.proxad.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
114.67.246.133 attackspam
Oct  8 02:02:29 ws26vmsma01 sshd[86523]: Failed password for root from 114.67.246.133 port 57576 ssh2
...
2020-10-08 12:27:12
106.13.98.59 attackspam
Oct  8 04:05:34 jumpserver sshd[570498]: Failed password for root from 106.13.98.59 port 52618 ssh2
Oct  8 04:09:35 jumpserver sshd[570548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.98.59  user=root
Oct  8 04:09:37 jumpserver sshd[570548]: Failed password for root from 106.13.98.59 port 54134 ssh2
...
2020-10-08 12:26:24
132.232.1.155 attackspam
2020-10-08T05:00:53.120163vps773228.ovh.net sshd[13542]: Failed password for root from 132.232.1.155 port 49598 ssh2
2020-10-08T05:05:25.994943vps773228.ovh.net sshd[13606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155  user=root
2020-10-08T05:05:27.710296vps773228.ovh.net sshd[13606]: Failed password for root from 132.232.1.155 port 44146 ssh2
2020-10-08T05:09:55.243503vps773228.ovh.net sshd[13694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.1.155  user=root
2020-10-08T05:09:57.024653vps773228.ovh.net sshd[13694]: Failed password for root from 132.232.1.155 port 38702 ssh2
...
2020-10-08 12:22:19
112.85.42.112 attack
(sshd) Failed SSH login from 112.85.42.112 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  8 00:38:37 optimus sshd[20764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.112  user=root
Oct  8 00:38:37 optimus sshd[20772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.112  user=root
Oct  8 00:38:37 optimus sshd[20765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.112  user=root
Oct  8 00:38:37 optimus sshd[20768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.112  user=root
Oct  8 00:38:37 optimus sshd[20782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.112  user=root
2020-10-08 12:41:00
177.154.174.27 attackbotsspam
20 attempts against mh-ssh on maple
2020-10-08 12:35:02
116.100.7.212 attackspambots
Port probing on unauthorized port 23
2020-10-08 12:30:20
51.75.210.209 attack
Oct  6 05:59:37 v26 sshd[26736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.210.209  user=r.r
Oct  6 05:59:39 v26 sshd[26736]: Failed password for r.r from 51.75.210.209 port 54046 ssh2
Oct  6 05:59:39 v26 sshd[26736]: Received disconnect from 51.75.210.209 port 54046:11: Bye Bye [preauth]
Oct  6 05:59:39 v26 sshd[26736]: Disconnected from 51.75.210.209 port 54046 [preauth]
Oct  6 06:20:03 v26 sshd[29030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.210.209  user=r.r
Oct  6 06:20:04 v26 sshd[29030]: Failed password for r.r from 51.75.210.209 port 60512 ssh2
Oct  6 06:20:04 v26 sshd[29030]: Received disconnect from 51.75.210.209 port 60512:11: Bye Bye [preauth]
Oct  6 06:20:04 v26 sshd[29030]: Disconnected from 51.75.210.209 port 60512 [preauth]
Oct  6 06:25:19 v26 sshd[29886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.2........
-------------------------------
2020-10-08 12:10:15
71.189.47.10 attackbotsspam
Oct  7 22:24:40 NPSTNNYC01T sshd[3552]: Failed password for root from 71.189.47.10 port 21978 ssh2
Oct  7 22:28:18 NPSTNNYC01T sshd[3721]: Failed password for root from 71.189.47.10 port 57711 ssh2
...
2020-10-08 12:36:48
212.70.149.68 attack
Oct  8 05:44:12 s1 postfix/smtps/smtpd\[4211\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:46:07 s1 postfix/smtps/smtpd\[4288\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:48:00 s1 postfix/smtps/smtpd\[4211\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:49:54 s1 postfix/smtps/smtpd\[4211\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:51:48 s1 postfix/smtps/smtpd\[4211\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:53:42 s1 postfix/smtps/smtpd\[6292\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 05:55:36 s1 postfix/smtps/smtpd\[6292\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  8 06:06:59 s1 postfix/smtps/smtpd\[10573\]: warning: unknown\[212.70.149.68\]: SASL LOGIN authentication fail
2020-10-08 12:42:45
203.56.24.180 attack
Oct  7 23:42:20 mout sshd[761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.56.24.180  user=root
Oct  7 23:42:21 mout sshd[761]: Failed password for root from 203.56.24.180 port 46348 ssh2
2020-10-08 12:45:15
209.141.51.154 attackbots
4000/udp
[2020-10-07]1pkt
2020-10-08 12:29:34
120.85.61.98 attack
Oct  8 03:59:24 xeon sshd[40479]: Failed password for root from 120.85.61.98 port 39115 ssh2
2020-10-08 12:21:12
123.120.24.69 attackspambots
Automatic report - Banned IP Access
2020-10-08 12:24:14
152.136.133.145 attack
2020-10-07T22:11:54.554092shield sshd\[22818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.133.145  user=root
2020-10-07T22:11:56.252850shield sshd\[22818\]: Failed password for root from 152.136.133.145 port 43076 ssh2
2020-10-07T22:14:55.577031shield sshd\[23152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.133.145  user=root
2020-10-07T22:14:57.123930shield sshd\[23152\]: Failed password for root from 152.136.133.145 port 49594 ssh2
2020-10-07T22:17:49.465575shield sshd\[23556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.133.145  user=root
2020-10-08 12:20:44
92.239.13.99 attack
Oct  7 22:47:11 pve1 sshd[24575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.239.13.99 
...
2020-10-08 12:43:59

Recently Reported IPs

126.202.221.31 137.128.220.22 138.254.91.65 3.78.140.187
168.13.249.73 154.82.22.245 78.245.155.150 125.237.173.241
120.47.172.189 52.86.44.26 37.188.132.22 90.119.102.171
38.255.101.85 142.13.53.130 93.46.83.35 82.41.120.198
116.51.213.154 115.84.219.10 113.69.186.168 187.211.77.166