Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.69.80.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43623
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.69.80.52.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061800 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 18 23:24:27 CST 2019
;; MSG SIZE  rcvd: 115
Host info
52.80.69.82.in-addr.arpa domain name pointer 82-69-80-52.dsl.in-addr.zen.co.uk.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
52.80.69.82.in-addr.arpa	name = 82-69-80-52.dsl.in-addr.zen.co.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.130.129.164 attackbotsspam
Unauthorized connection attempt detected from IP address 220.130.129.164 to port 2220 [J]
2020-01-08 20:02:19
31.211.65.102 attackbots
Jan  8 10:09:07 vmanager6029 sshd\[25919\]: Invalid user exx from 31.211.65.102 port 44842
Jan  8 10:09:07 vmanager6029 sshd\[25919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.211.65.102
Jan  8 10:09:08 vmanager6029 sshd\[25919\]: Failed password for invalid user exx from 31.211.65.102 port 44842 ssh2
2020-01-08 20:21:44
177.8.172.218 attackbotsspam
Unauthorized connection attempt from IP address 177.8.172.218 on Port 445(SMB)
2020-01-08 19:58:13
111.3.74.11 attackbots
Jan  8 12:50:43 nginx sshd[87723]: Invalid user admin from 111.3.74.11
Jan  8 12:50:43 nginx sshd[87723]: Connection closed by 111.3.74.11 port 2183 [preauth]
2020-01-08 20:16:48
217.57.130.226 attackspam
Unauthorized connection attempt from IP address 217.57.130.226 on Port 445(SMB)
2020-01-08 20:27:38
190.72.33.65 attackspambots
Unauthorized connection attempt from IP address 190.72.33.65 on Port 445(SMB)
2020-01-08 20:24:06
222.186.42.7 attack
Unauthorized connection attempt detected from IP address 222.186.42.7 to port 22 [T]
2020-01-08 19:55:01
88.15.211.105 attackbots
Jan  6 17:10:52 cumulus sshd[31602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.15.211.105  user=r.r
Jan  6 17:10:54 cumulus sshd[31602]: Failed password for r.r from 88.15.211.105 port 42336 ssh2
Jan  6 17:10:54 cumulus sshd[31602]: Received disconnect from 88.15.211.105 port 42336:11: Bye Bye [preauth]
Jan  6 17:10:54 cumulus sshd[31602]: Disconnected from 88.15.211.105 port 42336 [preauth]
Jan  6 17:19:19 cumulus sshd[32008]: Invalid user albano from 88.15.211.105 port 35020
Jan  6 17:19:19 cumulus sshd[32008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.15.211.105
Jan  6 17:19:22 cumulus sshd[32008]: Failed password for invalid user albano from 88.15.211.105 port 35020 ssh2
Jan  6 17:19:22 cumulus sshd[32008]: Received disconnect from 88.15.211.105 port 35020:11: Bye Bye [preauth]
Jan  6 17:19:22 cumulus sshd[32008]: Disconnected from 88.15.211.105 port 35020 [preauth]


........
--------------------------------
2020-01-08 20:06:34
108.191.86.23 attack
Jan  8 03:59:00 firewall sshd[30035]: Invalid user bw from 108.191.86.23
Jan  8 03:59:02 firewall sshd[30035]: Failed password for invalid user bw from 108.191.86.23 port 38590 ssh2
Jan  8 04:04:05 firewall sshd[30163]: Invalid user wbh from 108.191.86.23
...
2020-01-08 19:56:33
51.91.100.236 attackspam
Unauthorized connection attempt detected from IP address 51.91.100.236 to port 2220 [J]
2020-01-08 20:11:06
116.136.21.12 attackspambots
Fail2Ban - FTP Abuse Attempt
2020-01-08 20:15:13
129.204.198.172 attackspam
Jan  8 09:04:50 ns381471 sshd[8906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.198.172
Jan  8 09:04:52 ns381471 sshd[8906]: Failed password for invalid user ictuser from 129.204.198.172 port 38078 ssh2
2020-01-08 20:19:03
96.47.10.53 attackbotsspam
Unauthorized connection attempt detected from IP address 96.47.10.53 to port 2220 [J]
2020-01-08 20:29:00
202.131.242.74 attack
Unauthorized connection attempt detected from IP address 202.131.242.74 to port 445
2020-01-08 20:08:55
1.179.184.149 attack
Unauthorized connection attempt from IP address 1.179.184.149 on Port 445(SMB)
2020-01-08 20:10:11

Recently Reported IPs

82.152.190.85 84.150.59.202 122.2.178.77 93.208.78.237
166.236.21.177 26.141.24.171 243.105.20.99 219.121.96.131
142.99.179.29 166.30.42.215 223.218.111.152 41.100.188.149
144.113.146.84 191.53.253.107 79.195.109.176 217.64.42.229
197.114.247.0 211.106.133.153 73.239.74.11 119.17.94.46