Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bergamo

Region: Lombardy

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: Telecom Italia

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.53.192.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6714
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.53.192.66.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jun 12 10:16:09 CST 2019
;; MSG SIZE  rcvd: 116

Host info
66.192.53.82.in-addr.arpa domain name pointer host66-192-dynamic.53-82-r.retail.telecomitalia.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
66.192.53.82.in-addr.arpa	name = host66-192-dynamic.53-82-r.retail.telecomitalia.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.155 attack
Sep  8 11:18:39 abendstille sshd\[3074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Sep  8 11:18:41 abendstille sshd\[3074\]: Failed password for root from 222.186.42.155 port 13523 ssh2
Sep  8 11:18:44 abendstille sshd\[3074\]: Failed password for root from 222.186.42.155 port 13523 ssh2
Sep  8 11:18:46 abendstille sshd\[3074\]: Failed password for root from 222.186.42.155 port 13523 ssh2
Sep  8 11:18:48 abendstille sshd\[3124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
...
2020-09-08 17:25:02
156.218.150.24 attack
trying to access non-authorized port
2020-09-08 17:31:59
194.6.231.122 attack
SSH BruteForce Attack
2020-09-08 17:41:53
183.97.39.5 attack
$f2bV_matches
2020-09-08 17:40:05
46.29.255.147 attackbots
Auto Detect Rule!
proto TCP (SYN), 46.29.255.147:46461->gjan.info:1433, len 40
2020-09-08 17:39:37
92.63.196.40 attack
Sep  8 05:21:13   TCP Attack: SRC=92.63.196.40 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=242  PROTO=TCP SPT=49582 DPT=21912 WINDOW=1024 RES=0x00 SYN URGP=0
2020-09-08 17:45:48
182.74.203.106 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-08 17:35:59
174.204.30.239 attackspambots
Brute forcing email accounts
2020-09-08 17:29:36
164.90.189.13 attackbots
Port scan denied
2020-09-08 17:42:46
222.186.30.35 attackspam
Brute-force attempt banned
2020-09-08 17:28:51
84.252.22.202 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-08 17:51:19
218.88.46.192 attackbotsspam
Icarus honeypot on github
2020-09-08 17:26:43
173.201.196.220 attackspam
Automatic report - XMLRPC Attack
2020-09-08 17:46:16
212.64.71.254 attack
Sep  8 09:45:22 root sshd[1038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.71.254 
...
2020-09-08 17:49:09
111.231.89.140 attackspam
Sep  7 16:35:04 NPSTNNYC01T sshd[18546]: Failed password for root from 111.231.89.140 port 30758 ssh2
Sep  7 16:36:42 NPSTNNYC01T sshd[18678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.89.140
Sep  7 16:36:44 NPSTNNYC01T sshd[18678]: Failed password for invalid user elton from 111.231.89.140 port 48282 ssh2
...
2020-09-08 17:13:52

Recently Reported IPs

162.234.32.41 185.244.25.153 50.5.95.10 79.192.228.2
144.45.105.216 18.81.159.142 185.181.210.233 101.101.108.95
107.141.2.107 218.63.44.17 189.114.54.30 98.62.33.145
71.81.151.250 193.154.82.198 65.107.186.238 187.31.27.251
23.115.25.156 62.11.223.139 121.63.219.186 125.176.60.112