Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.42.237.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59466
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.42.237.215.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 11:38:47 CST 2022
;; MSG SIZE  rcvd: 106
Host info
215.237.42.82.in-addr.arpa domain name pointer cpc95138-newt39-2-0-cust470.19-3.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.237.42.82.in-addr.arpa	name = cpc95138-newt39-2-0-cust470.19-3.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
210.183.21.48 attackspambots
May 31 19:08:51 amit sshd\[26256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48  user=root
May 31 19:08:53 amit sshd\[26256\]: Failed password for root from 210.183.21.48 port 14532 ssh2
May 31 19:16:33 amit sshd\[26847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48  user=root
...
2020-06-01 01:34:47
87.251.74.222 attack
05/31/2020-13:09:45.443473 87.251.74.222 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-01 01:25:38
223.171.63.8 attackspam
Automatic report - Port Scan Attack
2020-06-01 01:17:01
112.85.42.172 attackbots
May 31 14:23:22 firewall sshd[6531]: Failed password for root from 112.85.42.172 port 10676 ssh2
May 31 14:23:26 firewall sshd[6531]: Failed password for root from 112.85.42.172 port 10676 ssh2
May 31 14:23:29 firewall sshd[6531]: Failed password for root from 112.85.42.172 port 10676 ssh2
...
2020-06-01 01:26:44
170.231.199.25 attackbotsspam
23/tcp
[2020-05-31]1pkt
2020-06-01 01:26:12
14.29.239.215 attackbots
2020-05-31T08:56:01.7803131495-001 sshd[47404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215  user=root
2020-05-31T08:56:03.9304591495-001 sshd[47404]: Failed password for root from 14.29.239.215 port 39248 ssh2
2020-05-31T08:57:36.8017751495-001 sshd[47463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215  user=root
2020-05-31T08:57:38.6607851495-001 sshd[47463]: Failed password for root from 14.29.239.215 port 56622 ssh2
2020-05-31T08:59:06.2076361495-001 sshd[47488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.239.215  user=root
2020-05-31T08:59:07.7555211495-001 sshd[47488]: Failed password for root from 14.29.239.215 port 45764 ssh2
...
2020-06-01 01:34:22
212.129.38.177 attack
May 31 13:09:35 cdc sshd[10111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.177  user=root
May 31 13:09:37 cdc sshd[10111]: Failed password for invalid user root from 212.129.38.177 port 33304 ssh2
2020-06-01 01:18:27
88.156.122.72 attackspam
(sshd) Failed SSH login from 88.156.122.72 (PL/Poland/088156122072.tarnowskiegory.vectranet.pl): 5 in the last 3600 secs
2020-06-01 01:41:46
1.174.245.114 attackspam
 TCP (SYN) 1.174.245.114:44803 -> port 23, len 44
2020-06-01 01:11:06
112.85.42.188 attackspam
05/31/2020-13:35:48.629128 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-06-01 01:37:37
51.79.57.12 attackspambots
 UDP 51.79.57.12:9090 -> port 5060, len 456
2020-06-01 01:23:00
1.53.30.193 attackbots
Automatic report - Port Scan Attack
2020-06-01 01:12:42
94.244.138.21 attack
" "
2020-06-01 01:11:37
62.210.108.139 attackbotsspam
...
2020-06-01 01:16:13
18.188.166.251 attack
mue-Direct access to plugin not allowed
2020-06-01 01:12:13

Recently Reported IPs

82.212.88.145 82.55.35.143 82.205.69.4 82.56.42.22
82.58.93.66 82.205.83.57 82.64.156.219 82.59.237.27
82.76.14.147 82.79.225.171 83.10.58.13 83.110.6.62
83.110.81.121 83.136.182.90 83.149.19.221 83.149.21.223
83.135.132.73 83.171.255.112 83.171.254.243 83.142.49.3