Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.192.82.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.192.82.48.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081500 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 15 17:42:05 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 48.82.192.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.82.192.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.34.91.22 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-09 16:48:26
79.13.27.192 attack
Lines containing failures of 79.13.27.192
Sep  9 09:17:14 nbi-636 sshd[32022]: Invalid user ilie from 79.13.27.192 port 59372
Sep  9 09:17:14 nbi-636 sshd[32022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.13.27.192 
Sep  9 09:17:16 nbi-636 sshd[32022]: Failed password for invalid user ilie from 79.13.27.192 port 59372 ssh2
Sep  9 09:17:18 nbi-636 sshd[32022]: Received disconnect from 79.13.27.192 port 59372:11: Bye Bye [preauth]
Sep  9 09:17:18 nbi-636 sshd[32022]: Disconnected from invalid user ilie 79.13.27.192 port 59372 [preauth]
Sep  9 09:24:41 nbi-636 sshd[1979]: User r.r from 79.13.27.192 not allowed because not listed in AllowUsers
Sep  9 09:24:41 nbi-636 sshd[1979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.13.27.192  user=r.r
Sep  9 09:24:43 nbi-636 sshd[1979]: Failed password for invalid user r.r from 79.13.27.192 port 56628 ssh2
Sep  9 09:24:43 nbi-636 sshd[1979]........
------------------------------
2020-09-09 17:01:34
199.167.91.162 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-09 16:48:07
140.143.206.191 attackspambots
Sep  9 08:15:10 scw-tender-jepsen sshd[27539]: Failed password for root from 140.143.206.191 port 55882 ssh2
2020-09-09 16:56:17
175.24.72.167 attackbots
2020-09-08T16:51:49.884540upcloud.m0sh1x2.com sshd[2280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.72.167  user=root
2020-09-08T16:51:51.495874upcloud.m0sh1x2.com sshd[2280]: Failed password for root from 175.24.72.167 port 55206 ssh2
2020-09-09 16:28:54
139.198.121.63 attack
Sep  9 08:24:14 root sshd[486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.121.63 
...
2020-09-09 16:56:41
2.56.207.101 attackspambots
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 16:28:20
194.5.207.189 attackspambots
Sep  9 09:14:13 root sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.5.207.189 
...
2020-09-09 16:55:11
93.62.72.87 attackbots
93.62.72.87 (IT/Italy/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep  8 12:51:07 server4 sshd[31509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.0.155.15  user=root
Sep  8 12:52:18 server4 sshd[32402]: Failed password for root from 93.62.72.87 port 52728 ssh2
Sep  8 12:48:36 server4 sshd[30296]: Failed password for root from 79.13.27.192 port 58687 ssh2
Sep  8 12:51:09 server4 sshd[31509]: Failed password for root from 168.0.155.15 port 50218 ssh2
Sep  8 12:50:24 server4 sshd[31306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.8.2  user=root
Sep  8 12:50:26 server4 sshd[31306]: Failed password for root from 143.255.8.2 port 49984 ssh2

IP Addresses Blocked:

168.0.155.15 (BR/Brazil/-)
2020-09-09 17:03:30
181.15.198.218 attack
(sshd) Failed SSH login from 181.15.198.218 (AR/Argentina/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  9 02:06:14 server2 sshd[30904]: Invalid user tom from 181.15.198.218
Sep  9 02:06:16 server2 sshd[30904]: Failed password for invalid user tom from 181.15.198.218 port 50699 ssh2
Sep  9 02:19:06 server2 sshd[7118]: Invalid user medical from 181.15.198.218
Sep  9 02:19:08 server2 sshd[7118]: Failed password for invalid user medical from 181.15.198.218 port 37874 ssh2
Sep  9 02:24:57 server2 sshd[9845]: Invalid user pc from 181.15.198.218
2020-09-09 17:08:17
83.13.170.66 attack
Attempted Email Sync. Password Hacking/Probing.
2020-09-09 16:29:20
181.40.76.162 attack
...
2020-09-09 17:07:52
46.101.181.170 attack
Port scan denied
2020-09-09 16:40:07
185.220.103.6 attackspam
Time:     Wed Sep  9 07:58:03 2020 +0000
IP:       185.220.103.6 (DE/Germany/karensilkwood.tor-exit.calyxinstitute.org)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  9 07:57:48 pv-14-ams2 sshd[21710]: Failed password for root from 185.220.103.6 port 44500 ssh2
Sep  9 07:57:50 pv-14-ams2 sshd[21710]: Failed password for root from 185.220.103.6 port 44500 ssh2
Sep  9 07:57:54 pv-14-ams2 sshd[21710]: Failed password for root from 185.220.103.6 port 44500 ssh2
Sep  9 07:57:57 pv-14-ams2 sshd[21710]: Failed password for root from 185.220.103.6 port 44500 ssh2
Sep  9 07:57:59 pv-14-ams2 sshd[21710]: Failed password for root from 185.220.103.6 port 44500 ssh2
2020-09-09 16:33:10
49.233.139.218 attack
SSH Invalid Login
2020-09-09 16:47:08

Recently Reported IPs

185.209.162.60 45.176.215.70 141.145.116.229 23.82.28.25
45.72.61.23 172.253.11.4 23.95.204.167 2.50.172.15
84.17.48.249 23.245.154.104 200.11.139.233 183.89.120.180
36.90.63.130 2.234.154.2 41.79.19.123 157.48.157.160
221.144.110.220 217.116.135.110 212.156.15.138 193.35.111.158