Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: IP-Only Networks AB

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Dec  4 22:45:44 server sshd\[26792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237  user=root
Dec  4 22:45:46 server sshd\[26792\]: Failed password for root from 82.99.40.237 port 52090 ssh2
Dec  4 22:53:11 server sshd\[28701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237  user=root
Dec  4 22:53:13 server sshd\[28701\]: Failed password for root from 82.99.40.237 port 36128 ssh2
Dec  4 22:58:34 server sshd\[30139\]: Invalid user bw from 82.99.40.237
...
2019-12-05 07:53:14
attack
Dec  1 03:04:12 linuxvps sshd\[10765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237  user=root
Dec  1 03:04:14 linuxvps sshd\[10765\]: Failed password for root from 82.99.40.237 port 46704 ssh2
Dec  1 03:07:15 linuxvps sshd\[11059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237  user=root
Dec  1 03:07:18 linuxvps sshd\[11059\]: Failed password for root from 82.99.40.237 port 54164 ssh2
Dec  1 03:10:30 linuxvps sshd\[11105\]: Invalid user pennywell from 82.99.40.237
Dec  1 03:10:30 linuxvps sshd\[11105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237
2019-12-01 16:25:08
attack
Lines containing failures of 82.99.40.237
Nov 26 06:01:21 zabbix sshd[61470]: Invalid user jxd786 from 82.99.40.237 port 38994
Nov 26 06:01:21 zabbix sshd[61470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237
Nov 26 06:01:23 zabbix sshd[61470]: Failed password for invalid user jxd786 from 82.99.40.237 port 38994 ssh2
Nov 26 06:01:23 zabbix sshd[61470]: Received disconnect from 82.99.40.237 port 38994:11: Bye Bye [preauth]
Nov 26 06:01:23 zabbix sshd[61470]: Disconnected from invalid user jxd786 82.99.40.237 port 38994 [preauth]
Nov 26 06:32:14 zabbix sshd[62931]: Invalid user nevja from 82.99.40.237 port 51752
Nov 26 06:32:14 zabbix sshd[62931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.99.40.237
Nov 26 06:32:16 zabbix sshd[62931]: Failed password for invalid user nevja from 82.99.40.237 port 51752 ssh2
Nov 26 06:32:16 zabbix sshd[62931]: Received disconnect from 82.99........
------------------------------
2019-11-26 17:36:38
attackspambots
F2B jail: sshd. Time: 2019-11-20 09:40:02, Reported by: VKReport
2019-11-20 16:49:05
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.99.40.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35352
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.99.40.237.			IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112000 1800 900 604800 86400

;; Query time: 96 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 20 16:58:24 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 237.40.99.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 237.40.99.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.102.160 attack
$f2bV_matches
2020-01-03 07:35:17
139.59.94.225 attackbots
Jan  2 18:24:34 plusreed sshd[20507]: Invalid user newpass from 139.59.94.225
...
2020-01-03 07:41:21
106.12.205.34 attack
Jan  2 23:06:41 ms-srv sshd[22353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.205.34
Jan  2 23:06:43 ms-srv sshd[22353]: Failed password for invalid user www from 106.12.205.34 port 35016 ssh2
2020-01-03 07:37:59
213.251.41.52 attack
Jan  3 00:06:37 163-172-32-151 sshd[21229]: Invalid user vospay from 213.251.41.52 port 35688
...
2020-01-03 07:42:21
54.37.19.148 attackbots
Jan  2 18:07:03 mail sshd\[6456\]: Invalid user pokemon from 54.37.19.148
Jan  2 18:07:03 mail sshd\[6456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.19.148
...
2020-01-03 07:22:03
222.186.15.158 attackspam
Jan  3 00:32:35 MK-Soft-Root1 sshd[25549]: Failed password for root from 222.186.15.158 port 36262 ssh2
Jan  3 00:32:37 MK-Soft-Root1 sshd[25549]: Failed password for root from 222.186.15.158 port 36262 ssh2
...
2020-01-03 07:41:09
106.75.21.242 attack
Jan  3 00:06:55 haigwepa sshd[3956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.21.242 
Jan  3 00:06:57 haigwepa sshd[3956]: Failed password for invalid user yl from 106.75.21.242 port 55418 ssh2
...
2020-01-03 07:25:46
106.13.212.194 attack
SSH Brute Force, server-1 sshd[3515]: Failed password for invalid user mw from 106.13.212.194 port 57650 ssh2
2020-01-03 07:50:12
222.186.180.223 attackbotsspam
Jan  3 00:48:27 solowordpress sshd[5030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Jan  3 00:48:28 solowordpress sshd[5030]: Failed password for root from 222.186.180.223 port 23144 ssh2
...
2020-01-03 07:52:58
123.233.246.52 attackspambots
Bruteforce on smtp
2020-01-03 07:26:00
49.235.138.2 attack
SSH Brute Force, server-1 sshd[3517]: Failed password for invalid user msimon from 49.235.138.2 port 54694 ssh2
2020-01-03 07:51:39
106.75.61.203 attackspam
firewall-block, port(s): 13579/tcp
2020-01-03 07:23:54
49.88.112.113 attackbotsspam
Jan  2 18:37:29 plusreed sshd[23645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Jan  2 18:37:31 plusreed sshd[23645]: Failed password for root from 49.88.112.113 port 41717 ssh2
...
2020-01-03 07:39:57
190.234.206.247 attack
SSH Brute Force, server-1 sshd[3588]: Failed password for invalid user admin from 190.234.206.247 port 55585 ssh2
2020-01-03 07:48:36
181.111.181.50 attackspam
$f2bV_matches
2020-01-03 07:49:21

Recently Reported IPs

34.222.150.250 143.225.33.124 7.218.235.89 172.112.10.239
108.91.171.13 21.75.132.165 208.160.4.172 138.203.77.141
109.105.148.69 35.173.112.99 103.217.166.204 5.35.213.20
222.174.122.115 1.119.166.2 45.33.42.145 14.165.215.238
181.231.71.238 218.59.49.118 45.231.138.246 100.6.91.93