Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Perfugas

Region: Regione Autonoma della Sardegna

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.55.90.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3882
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.55.90.68.			IN	A

;; AUTHORITY SECTION:
.			184	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010900 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 09 16:49:20 CST 2023
;; MSG SIZE  rcvd: 104
Host info
68.90.55.82.in-addr.arpa domain name pointer host-82-55-90-68.retail.telecomitalia.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.90.55.82.in-addr.arpa	name = host-82-55-90-68.retail.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.6.168.253 attackspam
ICMP MH Probe, Scan /Distributed -
2020-03-27 00:56:28
50.2.109.70 attackbots
from mail.walletmedicine.com (50.2.109.70) - national_family_life@walletmedicine.com
2020-03-27 00:48:47
3.95.151.19 attack
Mar 26 14:38:35 taivassalofi sshd[196073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.95.151.19
Mar 26 14:38:37 taivassalofi sshd[196073]: Failed password for invalid user howard from 3.95.151.19 port 55824 ssh2
...
2020-03-27 00:54:14
106.6.168.91 attackbots
ICMP MH Probe, Scan /Distributed -
2020-03-27 00:53:43
107.155.58.145 attack
ICMP MH Probe, Scan /Distributed -
2020-03-27 00:12:27
104.236.238.243 attackspambots
leo_www
2020-03-27 00:55:36
58.217.19.40 attack
Automatic report - Port Scan Attack
2020-03-27 00:28:13
80.211.56.134 attackbotsspam
Mar 26 17:49:35 sso sshd[20608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.56.134
Mar 26 17:49:37 sso sshd[20608]: Failed password for invalid user lq from 80.211.56.134 port 42800 ssh2
...
2020-03-27 01:00:41
106.13.134.161 attackbotsspam
fail2ban
2020-03-27 00:39:15
106.13.37.164 attackbots
Mar 26 15:26:01 cloud sshd[23823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.37.164 
Mar 26 15:26:03 cloud sshd[23823]: Failed password for invalid user hack from 106.13.37.164 port 53568 ssh2
2020-03-27 00:08:56
103.115.128.106 attackspam
Unauthorized connection attempt detected from IP address 103.115.128.106 to port 445
2020-03-27 00:21:04
183.88.234.146 attackbotsspam
B: Magento admin pass test (wrong country)
2020-03-27 00:23:50
18.224.178.192 attackspam
$f2bV_matches
2020-03-27 00:56:01
178.60.38.58 attack
Mar 26 14:13:03 v22019038103785759 sshd\[21968\]: Invalid user edwards from 178.60.38.58 port 38823
Mar 26 14:13:03 v22019038103785759 sshd\[21968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.60.38.58
Mar 26 14:13:05 v22019038103785759 sshd\[21968\]: Failed password for invalid user edwards from 178.60.38.58 port 38823 ssh2
Mar 26 14:16:47 v22019038103785759 sshd\[22241\]: Invalid user re from 178.60.38.58 port 45309
Mar 26 14:16:47 v22019038103785759 sshd\[22241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.60.38.58
...
2020-03-27 00:12:11
82.78.126.187 attack
Automatic report - Port Scan Attack
2020-03-27 00:41:44

Recently Reported IPs

79.204.170.15 67.68.158.18 59.222.42.111 56.61.9.211
37.187.171.148 253.129.47.231 246.191.76.0 237.177.3.27
177.249.162.234 215.101.17.131 181.213.17.29 18.138.217.212
177.29.100.62 164.111.24.146 158.180.19.94 149.161.104.104
147.81.37.87 53.163.197.233 197.247.86.112 218.203.76.132