Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Groningen

Region: Groningen

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.94.43.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25678
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.94.43.8.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091200 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Sep 13 01:19:05 CST 2019
;; MSG SIZE  rcvd: 114
Host info
8.43.94.82.in-addr.arpa domain name pointer 82-94-43-8.ip.xs4all.nl.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
8.43.94.82.in-addr.arpa	name = 82-94-43-8.ip.xs4all.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.213.249.40 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 03:10:41
124.166.240.130 attack
Feb  2 00:29:34 areeb-Workstation sshd[24375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.166.240.130 
Feb  2 00:29:36 areeb-Workstation sshd[24375]: Failed password for invalid user test from 124.166.240.130 port 3512 ssh2
...
2020-02-02 03:15:24
101.95.29.150 attackspambots
Automatic report - Banned IP Access
2020-02-02 02:55:59
118.71.4.198 attackspambots
Honeypot attack, port: 445, PTR: ip-address-pool-xxx.fpt.vn.
2020-02-02 03:13:14
185.4.125.130 attackspambots
Feb  1 19:41:34 server sshd[34611]: Failed password for invalid user demo from 185.4.125.130 port 37726 ssh2
Feb  1 20:05:15 server sshd[35788]: Failed password for invalid user tf2server from 185.4.125.130 port 61936 ssh2
Feb  1 20:07:58 server sshd[35924]: Failed password for invalid user test from 185.4.125.130 port 22242 ssh2
2020-02-02 03:10:53
12.208.152.106 attackbots
Unauthorized connection attempt detected from IP address 12.208.152.106 to port 2220 [J]
2020-02-02 02:56:51
162.243.130.134 attack
26/tcp
[2020-02-01]1pkt
2020-02-02 02:38:56
143.208.84.29 attack
...
2020-02-02 02:59:49
60.13.240.104 attackbots
Unauthorized connection attempt detected from IP address 60.13.240.104 to port 1433 [J]
2020-02-02 03:02:22
143.192.97.178 attack
...
2020-02-02 03:11:08
144.217.13.40 attack
Unauthorized connection attempt detected from IP address 144.217.13.40 to port 2220 [J]
2020-02-02 02:49:15
78.85.34.138 attackbots
1433/tcp 1433/tcp
[2020-02-01]2pkt
2020-02-02 02:56:23
140.213.58.77 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-02 03:06:24
144.217.188.81 attackbots
...
2020-02-02 02:38:09
132.232.113.102 attackspam
Unauthorized connection attempt detected from IP address 132.232.113.102 to port 2220 [J]
2020-02-02 03:00:17

Recently Reported IPs

142.219.25.22 186.95.3.59 151.248.146.141 100.17.244.160
113.4.127.169 72.41.220.102 212.71.214.90 162.158.51.23
52.65.253.184 39.54.43.127 207.49.207.157 71.38.225.45
95.150.238.106 76.14.74.13 207.18.218.120 186.42.255.230
42.50.56.8 207.255.187.92 103.238.228.29 60.246.231.8