Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.42.52.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.42.52.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 21:50:07 CST 2025
;; MSG SIZE  rcvd: 105
Host info
147.52.42.82.in-addr.arpa domain name pointer hari-19-b2-v4wan-167905-cust1170.vm1.cable.virginm.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.52.42.82.in-addr.arpa	name = hari-19-b2-v4wan-167905-cust1170.vm1.cable.virginm.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.114.144.96 attackbotsspam
May 14 13:22:42 pi sshd[18080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.144.96 
May 14 13:22:44 pi sshd[18080]: Failed password for invalid user hc from 167.114.144.96 port 47738 ssh2
2020-07-24 04:24:56
219.85.43.69 attack
Zeroshell Net Services Remote Command Execution Vulnerability, PTR: 219-85-43-69-adsl-TPE.dynamic.so-net.net.tw.
2020-07-24 04:23:58
2001:41d0:1:8ebd::1 attack
webserver:80 [23/Jul/2020]  "GET /wp-login.php HTTP/1.1" 403 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-24 04:33:28
35.154.12.123 attack
Jul 23 22:20:37 mellenthin sshd[23675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.154.12.123
Jul 23 22:20:40 mellenthin sshd[23675]: Failed password for invalid user admin from 35.154.12.123 port 33812 ssh2
2020-07-24 04:27:58
1.54.133.10 attack
Brute-force attempt banned
2020-07-24 04:29:40
80.82.65.90 attackbotsspam
80.82.65.90 was recorded 9 times by 6 hosts attempting to connect to the following ports: 123,389,53. Incident counter (4h, 24h, all-time): 9, 13, 7711
2020-07-24 04:26:29
68.183.189.24 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-23T17:33:43Z and 2020-07-23T17:42:24Z
2020-07-24 04:10:52
179.131.11.234 attack
SSH Brute-Forcing (server2)
2020-07-24 04:17:38
163.172.62.124 attack
2020-07-23T20:10:50.940422shield sshd\[9937\]: Invalid user l4d2 from 163.172.62.124 port 42314
2020-07-23T20:10:50.947883shield sshd\[9937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.62.124
2020-07-23T20:10:53.070459shield sshd\[9937\]: Failed password for invalid user l4d2 from 163.172.62.124 port 42314 ssh2
2020-07-23T20:17:02.935183shield sshd\[10883\]: Invalid user postgres from 163.172.62.124 port 58420
2020-07-23T20:17:02.945863shield sshd\[10883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.62.124
2020-07-24 04:18:49
162.243.237.90 attackspambots
Jul 23 22:34:22 OPSO sshd\[29563\]: Invalid user testuser from 162.243.237.90 port 41848
Jul 23 22:34:22 OPSO sshd\[29563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90
Jul 23 22:34:24 OPSO sshd\[29563\]: Failed password for invalid user testuser from 162.243.237.90 port 41848 ssh2
Jul 23 22:39:10 OPSO sshd\[30851\]: Invalid user postgres from 162.243.237.90 port 49029
Jul 23 22:39:10 OPSO sshd\[30851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90
2020-07-24 04:40:01
211.112.18.37 attack
Jul 23 22:20:35 ip106 sshd[17600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.112.18.37 
Jul 23 22:20:37 ip106 sshd[17600]: Failed password for invalid user iz from 211.112.18.37 port 48108 ssh2
...
2020-07-24 04:34:28
139.155.79.24 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-24 04:19:49
116.75.126.81 attackspambots
20/7/23@16:20:32: FAIL: IoT-SSH address from=116.75.126.81
...
2020-07-24 04:41:53
116.121.119.103 attackbots
$f2bV_matches
2020-07-24 04:21:17
222.186.180.147 attackspambots
Jul 24 01:20:22 gw1 sshd[27929]: Failed password for root from 222.186.180.147 port 25548 ssh2
Jul 24 01:20:36 gw1 sshd[27929]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 25548 ssh2 [preauth]
...
2020-07-24 04:33:56

Recently Reported IPs

178.7.63.64 245.222.56.146 122.122.216.235 70.17.237.68
64.12.29.30 185.241.57.37 62.110.212.9 140.53.158.174
233.138.100.64 6.65.75.161 136.2.56.110 248.106.13.90
150.224.90.95 188.229.77.232 156.69.194.229 135.218.124.216
141.0.17.215 156.64.53.107 145.211.71.88 217.245.52.65