Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.145.43.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.145.43.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 23:49:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.43.145.149.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 149.145.43.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
104.248.209.204 attackspam
SSH-BruteForce
2020-03-27 08:50:22
103.126.56.22 attackspam
Invalid user uh from 103.126.56.22 port 33250
2020-03-27 08:47:36
159.65.13.233 attackspam
Invalid user oracle from 159.65.13.233 port 33032
2020-03-27 08:21:02
45.133.99.3 attack
Mar 27 02:25:56 mail postfix/smtpd[180263]: warning: unknown[45.133.99.3]: SASL LOGIN authentication failed: authentication failure
Mar 27 02:26:02 mail postfix/smtpd[180263]: warning: unknown[45.133.99.3]: SASL LOGIN authentication failed: authentication failure
Mar 27 02:32:50 mail postfix/smtpd[180301]: warning: unknown[45.133.99.3]: SASL LOGIN authentication failed: authentication failure
...
2020-03-27 08:33:07
51.68.203.118 attack
Brute force attack against VPN service
2020-03-27 08:41:38
165.227.26.69 attackbots
Invalid user mp from 165.227.26.69 port 58104
2020-03-27 08:34:31
72.11.135.218 attack
Repeated Authentication Failures and excessive Rate Controlled.
2020-03-27 08:55:01
119.82.240.122 attack
Invalid user rhedyn from 119.82.240.122 port 43764
2020-03-27 08:50:05
190.9.132.186 attackbots
Invalid user xm from 190.9.132.186 port 50427
2020-03-27 08:57:00
128.199.143.89 attack
Invalid user adelaide from 128.199.143.89 port 37644
2020-03-27 08:24:19
106.54.52.35 attack
Mar 27 01:29:30 localhost sshd\[24878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35  user=games
Mar 27 01:29:32 localhost sshd\[24878\]: Failed password for games from 106.54.52.35 port 44280 ssh2
Mar 27 01:34:16 localhost sshd\[25077\]: Invalid user ygg from 106.54.52.35
Mar 27 01:34:16 localhost sshd\[25077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.52.35
Mar 27 01:34:19 localhost sshd\[25077\]: Failed password for invalid user ygg from 106.54.52.35 port 47358 ssh2
...
2020-03-27 08:48:16
197.54.144.208 attackspambots
port scan and connect, tcp 23 (telnet)
2020-03-27 08:23:49
112.80.125.43 attackbots
Repeated RDP login failures. Last user: Test
2020-03-27 08:35:15
95.181.131.153 attackspam
Invalid user dmitry from 95.181.131.153 port 38286
2020-03-27 08:38:28
49.233.144.153 attackspambots
Invalid user shop2net from 49.233.144.153 port 44382
2020-03-27 08:25:16

Recently Reported IPs

64.239.6.98 55.170.39.218 187.238.59.88 15.216.152.173
220.2.111.101 189.161.28.182 37.229.187.152 57.245.158.80
130.93.112.23 69.36.247.157 45.134.203.214 209.73.245.209
73.11.42.39 74.20.113.208 138.137.205.63 37.5.78.31
27.156.225.236 36.248.95.7 185.183.40.87 15.38.251.100