Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Winschoten

Region: Groningen

Country: Netherlands

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.73.149.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.73.149.39.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041801 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 19 06:43:09 CST 2020
;; MSG SIZE  rcvd: 116
Host info
39.149.73.82.in-addr.arpa domain name pointer 82-73-149-39.cable.dynamic.v4.ziggo.nl.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
39.149.73.82.in-addr.arpa	name = 82-73-149-39.cable.dynamic.v4.ziggo.nl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
51.178.52.56 attack
$f2bV_matches
2020-05-30 16:06:16
112.103.95.245 attack
Unauthorized connection attempt detected from IP address 112.103.95.245 to port 23
2020-05-30 16:36:56
122.192.255.228 attackbots
May 30 07:58:25 ajax sshd[4523]: Failed password for postfix from 122.192.255.228 port 28830 ssh2
2020-05-30 16:11:38
84.131.88.58 attack
Hits on port : 85
2020-05-30 16:32:18
181.123.9.3 attackbotsspam
$f2bV_matches
2020-05-30 16:42:31
125.224.108.3 attackspambots
Unauthorized connection attempt from IP address 125.224.108.3 on Port 445(SMB)
2020-05-30 16:39:05
62.215.6.11 attackspam
Invalid user philip from 62.215.6.11 port 59659
2020-05-30 16:37:49
186.147.160.189 attackspambots
Invalid user apagar from 186.147.160.189 port 40852
2020-05-30 16:17:00
45.178.1.37 attackspam
Invalid user server from 45.178.1.37 port 57556
2020-05-30 16:23:07
106.124.91.84 attackspam
(eximsyntax) Exim syntax errors from 106.124.91.84 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-30 08:18:54 SMTP call from [106.124.91.84] dropped: too many syntax or protocol errors (last command was "?\034?\032?\027?\031?\034?\033?\030?\032?\026?\016?\r?\v?\f?	?")
2020-05-30 16:34:56
123.20.28.235 attackspambots
Unauthorized IMAP connection attempt
2020-05-30 16:45:58
218.92.0.205 attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-05-30 16:11:14
138.197.89.186 attackbots
May 30 08:25:33 ajax sshd[8454]: Failed password for root from 138.197.89.186 port 58064 ssh2
2020-05-30 16:40:44
206.189.210.235 attackspam
Invalid user makenzie from 206.189.210.235 port 60482
2020-05-30 16:44:38
195.122.226.164 attackspambots
Invalid user ogg from 195.122.226.164 port 64554
2020-05-30 16:24:55

Recently Reported IPs

178.22.116.55 93.3.151.191 68.78.20.153 5.241.135.149
125.43.226.25 188.17.183.1 74.57.14.68 176.58.128.96
124.124.182.47 123.206.68.236 177.149.0.70 82.8.38.65
12.204.212.95 133.218.69.120 98.247.143.144 116.179.145.103
121.137.214.51 52.183.59.231 23.97.234.12 198.125.171.153