Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Botuvera

Region: Santa Catarina

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.249.82.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46913
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.249.82.55.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042905 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 30 06:57:14 CST 2020
;; MSG SIZE  rcvd: 117
Host info
55.82.249.191.in-addr.arpa domain name pointer 191.249.82.55.dynamic.adsl.gvt.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
55.82.249.191.in-addr.arpa	name = 191.249.82.55.dynamic.adsl.gvt.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.159.66.109 attackspam
Jun 24 06:44:34 vps687878 sshd\[15153\]: Invalid user wesley from 115.159.66.109 port 57486
Jun 24 06:44:34 vps687878 sshd\[15153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.66.109
Jun 24 06:44:36 vps687878 sshd\[15153\]: Failed password for invalid user wesley from 115.159.66.109 port 57486 ssh2
Jun 24 06:52:32 vps687878 sshd\[16123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.66.109  user=root
Jun 24 06:52:34 vps687878 sshd\[16123\]: Failed password for root from 115.159.66.109 port 60394 ssh2
...
2020-06-24 16:28:09
141.98.81.208 attackspam
2020-06-24T07:26:51.738530shield sshd\[31628\]: Invalid user Administrator from 141.98.81.208 port 28567
2020-06-24T07:26:51.742162shield sshd\[31628\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208
2020-06-24T07:26:54.391013shield sshd\[31628\]: Failed password for invalid user Administrator from 141.98.81.208 port 28567 ssh2
2020-06-24T07:27:10.566937shield sshd\[31719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.208  user=root
2020-06-24T07:27:12.825892shield sshd\[31719\]: Failed password for root from 141.98.81.208 port 4065 ssh2
2020-06-24 15:50:21
139.59.59.102 attackbotsspam
Jun 24 09:47:42 piServer sshd[18306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.102 
Jun 24 09:47:43 piServer sshd[18306]: Failed password for invalid user vnc from 139.59.59.102 port 51312 ssh2
Jun 24 09:51:25 piServer sshd[18639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.102 
...
2020-06-24 16:02:52
177.152.124.23 attackspam
Jun 24 07:10:47 vps687878 sshd\[17828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23  user=root
Jun 24 07:10:49 vps687878 sshd\[17828\]: Failed password for root from 177.152.124.23 port 42306 ssh2
Jun 24 07:15:54 vps687878 sshd\[18300\]: Invalid user f from 177.152.124.23 port 41318
Jun 24 07:15:54 vps687878 sshd\[18300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.23
Jun 24 07:15:56 vps687878 sshd\[18300\]: Failed password for invalid user f from 177.152.124.23 port 41318 ssh2
...
2020-06-24 16:20:24
123.231.160.98 attackbotsspam
prod8
...
2020-06-24 15:51:02
103.105.128.194 attackbots
Jun 24 12:53:51 itv-usvr-02 sshd[25220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194  user=root
Jun 24 12:53:52 itv-usvr-02 sshd[25220]: Failed password for root from 103.105.128.194 port 39350 ssh2
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: Invalid user andi from 103.105.128.194 port 64982
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.105.128.194
Jun 24 13:03:29 itv-usvr-02 sshd[25484]: Invalid user andi from 103.105.128.194 port 64982
Jun 24 13:03:31 itv-usvr-02 sshd[25484]: Failed password for invalid user andi from 103.105.128.194 port 64982 ssh2
2020-06-24 16:09:11
195.230.103.217 attack
Jun 24 10:08:43 root sshd[29715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.230.103.217  user=root
Jun 24 10:08:45 root sshd[29715]: Failed password for root from 195.230.103.217 port 33702 ssh2
...
2020-06-24 16:08:16
95.122.152.100 attackspam
2020-06-24T03:59:14.5563881495-001 sshd[29032]: Invalid user max from 95.122.152.100 port 52754
2020-06-24T03:59:16.6183271495-001 sshd[29032]: Failed password for invalid user max from 95.122.152.100 port 52754 ssh2
2020-06-24T04:05:29.0032111495-001 sshd[29306]: Invalid user www from 95.122.152.100 port 52753
2020-06-24T04:05:29.0063371495-001 sshd[29306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.red-95-122-152.staticip.rima-tde.net
2020-06-24T04:05:29.0032111495-001 sshd[29306]: Invalid user www from 95.122.152.100 port 52753
2020-06-24T04:05:30.8795431495-001 sshd[29306]: Failed password for invalid user www from 95.122.152.100 port 52753 ssh2
...
2020-06-24 16:27:18
101.55.28.3 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-24 16:02:21
177.203.184.152 attackbotsspam
Jun 24 09:45:24 nextcloud sshd\[13370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.203.184.152  user=root
Jun 24 09:45:26 nextcloud sshd\[13370\]: Failed password for root from 177.203.184.152 port 51504 ssh2
Jun 24 09:46:52 nextcloud sshd\[14880\]: Invalid user lydia from 177.203.184.152
2020-06-24 16:14:16
192.35.168.203 attack
Unauthorized connection attempt detected from IP address 192.35.168.203 to port 9200
2020-06-24 16:04:49
34.83.160.109 attackbotsspam
Jun 24 11:37:33 dhoomketu sshd[1000316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.83.160.109 
Jun 24 11:37:33 dhoomketu sshd[1000316]: Invalid user brian from 34.83.160.109 port 33276
Jun 24 11:37:35 dhoomketu sshd[1000316]: Failed password for invalid user brian from 34.83.160.109 port 33276 ssh2
Jun 24 11:41:04 dhoomketu sshd[1000428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.83.160.109  user=root
Jun 24 11:41:07 dhoomketu sshd[1000428]: Failed password for root from 34.83.160.109 port 34168 ssh2
...
2020-06-24 16:20:53
187.53.114.65 attackspambots
Jun 23 22:20:45 amida sshd[801227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-53-114-65.user3p.brasiltelecom.net.br  user=r.r
Jun 23 22:20:47 amida sshd[801227]: Failed password for r.r from 187.53.114.65 port 41914 ssh2
Jun 23 22:20:47 amida sshd[801227]: Received disconnect from 187.53.114.65: 11: Bye Bye [preauth]
Jun 23 22:34:10 amida sshd[804390]: Invalid user gustavo from 187.53.114.65
Jun 23 22:34:10 amida sshd[804390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187-53-114-65.user3p.brasiltelecom.net.br 
Jun 23 22:34:12 amida sshd[804390]: Failed password for invalid user gustavo from 187.53.114.65 port 46842 ssh2
Jun 23 22:34:12 amida sshd[804390]: Received disconnect from 187.53.114.65: 11: Bye Bye [preauth]
Jun 23 22:39:03 amida sshd[805642]: Invalid user hduser from 187.53.114.65
Jun 23 22:39:03 amida sshd[805642]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2020-06-24 16:09:56
218.92.0.171 attackspambots
Jun 24 09:53:48 vm1 sshd[28995]: Failed password for root from 218.92.0.171 port 19539 ssh2
Jun 24 09:54:02 vm1 sshd[28995]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 19539 ssh2 [preauth]
...
2020-06-24 15:56:16
85.117.94.30 attack
20/6/23@23:53:45: FAIL: Alarm-Network address from=85.117.94.30
...
2020-06-24 16:11:46

Recently Reported IPs

213.122.240.136 112.139.82.50 2.50.68.5 86.83.237.224
186.95.166.249 188.111.215.188 171.65.28.130 80.11.228.92
188.204.18.184 101.74.132.147 83.97.182.94 102.82.225.124
166.136.95.203 99.185.37.95 204.249.3.55 67.248.51.238
94.102.96.4 199.101.126.236 158.107.70.77 177.11.45.213