Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. Louis

Region: Missouri

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.48.82.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.48.82.6.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112500 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 25 16:50:51 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 6.82.48.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.82.48.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
121.183.126.103 attack
failed_logins
2019-08-12 02:49:52
180.96.14.98 attack
Aug 11 21:38:53 yabzik sshd[29970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.14.98
Aug 11 21:38:54 yabzik sshd[29970]: Failed password for invalid user hh from 180.96.14.98 port 21883 ssh2
Aug 11 21:41:27 yabzik sshd[31035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.96.14.98
2019-08-12 02:56:15
40.71.174.83 attack
Aug 11 21:06:10 OPSO sshd\[15792\]: Invalid user taku from 40.71.174.83 port 47826
Aug 11 21:06:10 OPSO sshd\[15792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.174.83
Aug 11 21:06:11 OPSO sshd\[15792\]: Failed password for invalid user taku from 40.71.174.83 port 47826 ssh2
Aug 11 21:10:51 OPSO sshd\[16327\]: Invalid user phillip from 40.71.174.83 port 42616
Aug 11 21:10:51 OPSO sshd\[16327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.174.83
2019-08-12 03:30:46
111.20.56.246 attackbots
Aug 11 20:13:50 xeon sshd[65192]: Failed password for invalid user app from 111.20.56.246 port 60017 ssh2
2019-08-12 02:54:20
141.98.9.130 attackbotsspam
Aug 11 20:39:01 relay postfix/smtpd\[16224\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 20:39:32 relay postfix/smtpd\[19142\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 20:40:47 relay postfix/smtpd\[19140\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 20:41:34 relay postfix/smtpd\[8741\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 11 20:42:01 relay postfix/smtpd\[19140\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 02:56:43
139.59.90.40 attack
Aug 11 21:05:28 vps647732 sshd[4974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.90.40
Aug 11 21:05:29 vps647732 sshd[4974]: Failed password for invalid user service from 139.59.90.40 port 15932 ssh2
...
2019-08-12 03:19:32
85.39.92.35 attackbotsspam
Telnet Server BruteForce Attack
2019-08-12 02:53:05
23.225.121.147 attackspambots
port scan and connect, tcp 80 (http)
2019-08-12 03:16:37
74.89.176.148 attackbots
Telnet Server BruteForce Attack
2019-08-12 02:57:06
159.65.239.104 attack
Aug 11 18:24:12 MK-Soft-VM4 sshd\[8135\]: Invalid user www from 159.65.239.104 port 56132
Aug 11 18:24:12 MK-Soft-VM4 sshd\[8135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.239.104
Aug 11 18:24:14 MK-Soft-VM4 sshd\[8135\]: Failed password for invalid user www from 159.65.239.104 port 56132 ssh2
...
2019-08-12 03:13:30
134.209.101.15 attackbots
Aug 11 20:57:01 SilenceServices sshd[4602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.101.15
Aug 11 20:57:03 SilenceServices sshd[4602]: Failed password for invalid user ubuntu from 134.209.101.15 port 33092 ssh2
Aug 11 21:01:36 SilenceServices sshd[7256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.101.15
2019-08-12 03:22:49
49.89.216.68 attack
Brute force attempt
2019-08-12 03:30:16
213.108.129.236 attack
2019-08-11T18:46:02.892741abusebot-2.cloudsearch.cf sshd\[581\]: Invalid user 102938 from 213.108.129.236 port 39454
2019-08-12 03:15:37
185.181.250.47 attack
RDPBrutePap24
2019-08-12 03:16:14
121.23.72.213 attackspam
Unauthorised access (Aug 11) SRC=121.23.72.213 LEN=40 TTL=49 ID=56828 TCP DPT=8080 WINDOW=24167 SYN 
Unauthorised access (Aug 11) SRC=121.23.72.213 LEN=40 TTL=49 ID=59612 TCP DPT=8080 WINDOW=24167 SYN
2019-08-12 03:26:22

Recently Reported IPs

176.167.225.107 44.132.120.142 79.254.136.224 229.141.127.194
239.159.162.185 238.178.255.66 141.251.133.113 186.177.222.79
240.239.106.29 56.17.185.64 9.180.116.86 10.152.16.252
148.174.224.110 135.176.201.100 73.203.80.182 252.132.179.83
69.205.113.202 159.229.154.46 167.190.8.228 242.140.168.87