Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.121.82.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59630
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.121.82.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010600 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 06 17:07:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
201.82.121.148.in-addr.arpa domain name pointer 201.82.121.148.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.82.121.148.in-addr.arpa	name = 201.82.121.148.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.114.102.136 attackbots
Jun 26 21:09:53 lnxded63 sshd[24807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.114.102.136
Jun 26 21:09:53 lnxded63 sshd[24807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.114.102.136
2019-06-27 06:42:55
196.52.43.110 attackspambots
Port scan: Attack repeated for 24 hours
2019-06-27 06:58:12
212.192.197.134 attackspam
ft-1848-fussball.de 212.192.197.134 \[27/Jun/2019:00:59:03 +0200\] "POST /wp-login.php HTTP/1.1" 200 2313 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 212.192.197.134 \[27/Jun/2019:00:59:04 +0200\] "POST /wp-login.php HTTP/1.1" 200 2278 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-06-27 07:09:41
120.236.135.204 attackspam
Jun 26 17:33:38 thebighonker dovecot[4890]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=120.236.135.204, lip=192.147.25.65, TLS, session=<9aKgokGM9Ll47IfM>
Jun 26 17:51:38 thebighonker dovecot[4890]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=120.236.135.204, lip=192.147.25.65, TLS: Connection closed, session=
Jun 26 17:58:46 thebighonker dovecot[4890]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=120.236.135.204, lip=192.147.25.65, TLS, session=
...
2019-06-27 07:15:20
196.52.43.116 attackbotsspam
[LAN access from remote] from 196.52.43.116:57984 to 192.168.X.XXX:6690, Wednesday, Jun 26,2019 00:27:49
2019-06-27 06:51:11
27.72.148.233 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 08:58:40,006 INFO [amun_request_handler] PortScan Detected on Port: 445 (27.72.148.233)
2019-06-27 07:00:53
138.197.167.5 attackspambots
Invalid user fake from 138.197.167.5 port 60794
2019-06-27 06:47:29
58.100.65.180 attackbots
Telnet login attempt
2019-06-27 06:50:16
185.176.27.246 attackspambots
57331/tcp 56399/tcp 56231/tcp...
[2019-04-26/06-26]3159pkt,1762pt.(tcp)
2019-06-27 06:44:29
89.133.62.227 attackbotsspam
Jun 27 00:58:53 vps647732 sshd[10017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.62.227
Jun 27 00:58:56 vps647732 sshd[10017]: Failed password for invalid user gmodttt from 89.133.62.227 port 54845 ssh2
...
2019-06-27 07:11:58
77.81.181.228 attack
Bulk Junk Spam
2019-06-27 07:18:50
121.226.62.234 attackspambots
2019-06-26T23:44:48.258121 X postfix/smtpd[29398]: warning: unknown[121.226.62.234]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27T00:41:51.223299 X postfix/smtpd[36635]: warning: unknown[121.226.62.234]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27T00:59:19.073702 X postfix/smtpd[39029]: warning: unknown[121.226.62.234]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-27 07:02:56
128.199.231.40 attackbots
Jun 27 00:58:37 core01 sshd\[11180\]: Invalid user deploy from 128.199.231.40 port 54640
Jun 27 00:58:37 core01 sshd\[11180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.231.40
...
2019-06-27 07:18:15
200.50.110.68 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 08:58:48,230 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.50.110.68)
2019-06-27 06:58:46
219.84.201.39 attack
19/6/26@18:59:06: FAIL: Alarm-Intrusion address from=219.84.201.39
...
2019-06-27 07:07:46

Recently Reported IPs

75.56.86.251 128.208.167.111 57.30.59.246 91.170.141.141
202.226.116.236 171.193.53.69 192.16.155.69 55.118.54.233
89.212.63.149 180.29.98.97 229.84.81.10 97.229.178.163
171.205.134.132 57.85.38.108 162.97.170.238 254.125.197.233
233.136.108.97 70.134.37.43 70.2.70.216 233.41.115.142