Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.48.25.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.48.25.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 03:14:15 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 82.25.48.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.25.48.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.192.100.139 attackbots
Sep 22 22:01:49 server sshd[50781]: Failed password for invalid user maint from 189.192.100.139 port 46476 ssh2
Sep 22 22:05:43 server sshd[51566]: Failed password for invalid user maria from 189.192.100.139 port 51173 ssh2
Sep 22 22:09:39 server sshd[52478]: Failed password for invalid user export from 189.192.100.139 port 55868 ssh2
2020-09-23 05:38:23
163.172.24.40 attackspambots
Sep 22 22:51:41 ns3164893 sshd[1961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.24.40
Sep 22 22:51:44 ns3164893 sshd[1961]: Failed password for invalid user gen from 163.172.24.40 port 60940 ssh2
...
2020-09-23 05:33:27
219.101.192.141 attackbots
Invalid user nancy from 219.101.192.141 port 37784
2020-09-23 05:39:46
95.71.135.110 attackbots
Sep 22 17:02:04 ssh2 sshd[20706]: User root from 95.71.135.110 not allowed because not listed in AllowUsers
Sep 22 17:02:04 ssh2 sshd[20706]: Failed password for invalid user root from 95.71.135.110 port 54288 ssh2
Sep 22 17:02:04 ssh2 sshd[20706]: Connection closed by invalid user root 95.71.135.110 port 54288 [preauth]
...
2020-09-23 05:46:20
103.85.172.150 attackspambots
Unauthorized SSH login attempts
2020-09-23 05:48:41
52.66.249.143 attackbotsspam
Time:     Tue Sep 22 19:07:47 2020 +0000
IP:       52.66.249.143 (IN/India/ec2-52-66-249-143.ap-south-1.compute.amazonaws.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 22 18:27:20 48-1 sshd[23277]: Invalid user www from 52.66.249.143 port 59842
Sep 22 18:27:22 48-1 sshd[23277]: Failed password for invalid user www from 52.66.249.143 port 59842 ssh2
Sep 22 18:49:51 48-1 sshd[24228]: Failed password for root from 52.66.249.143 port 48384 ssh2
Sep 22 19:07:42 48-1 sshd[25122]: Invalid user server from 52.66.249.143 port 52072
Sep 22 19:07:44 48-1 sshd[25122]: Failed password for invalid user server from 52.66.249.143 port 52072 ssh2
2020-09-23 05:19:13
62.103.87.101 attackspam
5x Failed Password
2020-09-23 05:13:31
177.220.174.238 attackspam
2020-09-22T22:10:37+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-09-23 05:27:46
62.234.127.234 attackspam
Brute-force attempt banned
2020-09-23 05:18:09
175.24.93.7 attackbots
Sep 22 23:16:00 hosting sshd[5635]: Invalid user sysbackup from 175.24.93.7 port 40850
...
2020-09-23 05:16:44
49.234.126.244 attackspambots
$f2bV_matches
2020-09-23 05:13:48
164.68.114.169 attackbots
20 attempts against mh-ssh on sand
2020-09-23 05:49:28
69.63.68.194 attackbotsspam
Found on   CINS badguys     / proto=6  .  srcport=41663  .  dstport=60001  .     (3084)
2020-09-23 05:45:52
36.239.103.115 attack
Sep 22 17:51:11 localhost sshd\[12155\]: Invalid user produccion from 36.239.103.115 port 48806
Sep 22 17:51:11 localhost sshd\[12155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.239.103.115
Sep 22 17:51:13 localhost sshd\[12155\]: Failed password for invalid user produccion from 36.239.103.115 port 48806 ssh2
...
2020-09-23 05:20:45
41.33.79.250 attackspam
20/9/22@13:04:41: FAIL: Alarm-Network address from=41.33.79.250
...
2020-09-23 05:44:25

Recently Reported IPs

195.182.157.112 184.208.89.136 210.146.106.37 149.42.124.162
123.214.197.207 24.13.43.0 248.249.18.100 144.63.225.247
189.111.219.144 109.60.229.160 253.132.52.210 28.238.234.69
62.89.22.166 33.15.55.76 161.212.84.172 5.244.85.162
128.76.116.114 228.65.155.28 197.140.132.164 150.60.217.43