Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.182.53.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.182.53.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 19:17:43 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.53.182.148.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 148.182.53.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
198.245.53.163 attackbots
Reported by AbuseIPDB proxy server.
2019-09-08 23:25:23
167.71.212.77 attack
2019-09-08T15:15:37.561946abusebot-5.cloudsearch.cf sshd\[17434\]: Invalid user password123 from 167.71.212.77 port 36866
2019-09-08 23:29:19
123.129.34.46 attackbotsspam
DATE:2019-09-08 13:33:21, IP:123.129.34.46, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-09-08 23:03:11
190.43.79.10 attackspam
Autoban   190.43.79.10 AUTH/CONNECT
2019-09-08 22:35:40
182.180.128.134 attackbotsspam
Sep  8 12:09:50 plex sshd[17152]: Invalid user mumbleserver from 182.180.128.134 port 33400
2019-09-08 22:48:35
164.77.188.109 attack
Sep  8 00:57:19 php2 sshd\[7353\]: Invalid user updater from 164.77.188.109
Sep  8 00:57:19 php2 sshd\[7353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.188.109
Sep  8 00:57:21 php2 sshd\[7353\]: Failed password for invalid user updater from 164.77.188.109 port 54016 ssh2
Sep  8 01:02:44 php2 sshd\[7797\]: Invalid user q3server from 164.77.188.109
Sep  8 01:02:44 php2 sshd\[7797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.188.109
2019-09-08 22:52:04
62.234.44.43 attackbots
Sep  8 09:43:56 Ubuntu-1404-trusty-64-minimal sshd\[12263\]: Invalid user user2 from 62.234.44.43
Sep  8 09:43:56 Ubuntu-1404-trusty-64-minimal sshd\[12263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.44.43
Sep  8 09:43:58 Ubuntu-1404-trusty-64-minimal sshd\[12263\]: Failed password for invalid user user2 from 62.234.44.43 port 58544 ssh2
Sep  8 10:10:41 Ubuntu-1404-trusty-64-minimal sshd\[3089\]: Invalid user vnc from 62.234.44.43
Sep  8 10:10:41 Ubuntu-1404-trusty-64-minimal sshd\[3089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.44.43
2019-09-08 23:44:47
124.93.18.202 attackbots
Sep  8 14:04:45 meumeu sshd[3148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.18.202 
Sep  8 14:04:47 meumeu sshd[3148]: Failed password for invalid user postgres from 124.93.18.202 port 27460 ssh2
Sep  8 14:08:23 meumeu sshd[3523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.93.18.202 
...
2019-09-08 23:15:41
84.242.96.142 attackspam
Sep  8 10:23:24 aat-srv002 sshd[17731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
Sep  8 10:23:26 aat-srv002 sshd[17731]: Failed password for invalid user dbuser from 84.242.96.142 port 46904 ssh2
Sep  8 10:27:39 aat-srv002 sshd[17887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
Sep  8 10:27:41 aat-srv002 sshd[17887]: Failed password for invalid user minecraft from 84.242.96.142 port 33916 ssh2
...
2019-09-08 23:39:36
89.216.56.67 attackspambots
Sep  8 04:11:42 localhost kernel: [1668118.738781] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=89.216.56.67 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=11443 PROTO=TCP SPT=43292 DPT=445 WINDOW=1024 RES=0x00 SYN URGP=0 
Sep  8 04:11:42 localhost kernel: [1668118.738802] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=89.216.56.67 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=11443 PROTO=TCP SPT=43292 DPT=445 SEQ=3998109040 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
2019-09-08 23:38:01
43.226.36.46 attackspambots
Sep  8 14:35:04 icinga sshd[62185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.36.46 
Sep  8 14:35:05 icinga sshd[62185]: Failed password for invalid user factorio from 43.226.36.46 port 47088 ssh2
Sep  8 14:50:25 icinga sshd[6983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.36.46 
...
2019-09-08 22:58:49
71.165.90.119 attackbots
Sep  8 15:40:06 xeon sshd[24816]: Failed password for invalid user dolores from 71.165.90.119 port 35210 ssh2
2019-09-08 22:57:33
36.236.191.186 attackspambots
23/tcp
[2019-09-08]1pkt
2019-09-08 22:40:45
31.163.129.109 attackbots
Spam Timestamp : 08-Sep-19 08:21   BlockList Provider  combined abuse   (729)
2019-09-08 22:39:10
144.217.42.212 attackspambots
Automatic report - Banned IP Access
2019-09-08 23:31:30

Recently Reported IPs

108.112.22.186 130.120.247.35 92.39.118.202 216.180.192.84
9.126.148.165 39.81.157.249 137.125.174.211 198.180.78.209
113.90.46.244 99.40.3.47 99.93.89.80 207.157.110.254
69.125.131.82 32.51.205.160 104.103.227.145 67.133.173.66
254.105.164.15 95.227.118.189 242.219.220.64 101.142.29.82