Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.246.149.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8964
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;198.246.149.82.			IN	A

;; AUTHORITY SECTION:
.			450	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110200 1800 900 604800 86400

;; Query time: 394 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 20:36:03 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 82.149.246.198.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.149.246.198.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.114.210.86 attackspambots
Sep 22 00:41:02 ns3110291 sshd\[12919\]: Invalid user ethos from 167.114.210.86
Sep 22 00:41:04 ns3110291 sshd\[12919\]: Failed password for invalid user ethos from 167.114.210.86 port 45890 ssh2
Sep 22 00:44:59 ns3110291 sshd\[13083\]: Invalid user taigab from 167.114.210.86
Sep 22 00:45:01 ns3110291 sshd\[13083\]: Failed password for invalid user taigab from 167.114.210.86 port 59682 ssh2
Sep 22 00:48:57 ns3110291 sshd\[13277\]: Invalid user ftpuser from 167.114.210.86
...
2019-09-22 09:28:08
104.128.57.170 attackbotsspam
Sep 21 12:33:17 wbs sshd\[21767\]: Invalid user jordan from 104.128.57.170
Sep 21 12:33:17 wbs sshd\[21767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.57.170
Sep 21 12:33:20 wbs sshd\[21767\]: Failed password for invalid user jordan from 104.128.57.170 port 53338 ssh2
Sep 21 12:37:26 wbs sshd\[22142\]: Invalid user rsyncuser from 104.128.57.170
Sep 21 12:37:26 wbs sshd\[22142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.57.170
2019-09-22 09:07:30
61.150.88.254 attackbotsspam
(Sep 22)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=63624 TCP DPT=8080 WINDOW=2006 SYN 
 (Sep 21)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=48335 TCP DPT=8080 WINDOW=29918 SYN 
 (Sep 21)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=12483 TCP DPT=8080 WINDOW=2006 SYN 
 (Sep 21)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=60898 TCP DPT=8080 WINDOW=33016 SYN 
 (Sep 20)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=7152 TCP DPT=8080 WINDOW=22515 SYN 
 (Sep 20)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=35917 TCP DPT=8080 WINDOW=33016 SYN 
 (Sep 20)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=60377 TCP DPT=8080 WINDOW=2006 SYN 
 (Sep 19)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=58431 TCP DPT=8080 WINDOW=2006 SYN 
 (Sep 18)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=22439 TCP DPT=8080 WINDOW=22515 SYN 
 (Sep 17)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=1744 TCP DPT=8080 WINDOW=29918 SYN 
 (Sep 17)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=60752 TCP DPT=8080 WINDOW=33016 SYN 
 (Sep 16)  LEN=44 TOS=0x10 PREC=0x40 TTL=49 ID=39507 TCP DPT=8080 WINDOW=29918 SYN...
2019-09-22 09:29:13
182.253.121.65 attackbots
Unauthorized connection attempt from IP address 182.253.121.65 on Port 445(SMB)
2019-09-22 09:26:26
94.102.3.242 attackspambots
Unauthorized connection attempt from IP address 94.102.3.242 on Port 445(SMB)
2019-09-22 09:07:47
213.194.74.226 attack
Unauthorized connection attempt from IP address 213.194.74.226 on Port 445(SMB)
2019-09-22 09:08:03
49.88.112.68 attackspambots
Sep 22 03:17:12 mail sshd\[9882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Sep 22 03:17:13 mail sshd\[9882\]: Failed password for root from 49.88.112.68 port 20408 ssh2
Sep 22 03:17:16 mail sshd\[9882\]: Failed password for root from 49.88.112.68 port 20408 ssh2
Sep 22 03:17:18 mail sshd\[9882\]: Failed password for root from 49.88.112.68 port 20408 ssh2
Sep 22 03:18:05 mail sshd\[9978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
2019-09-22 09:25:24
118.25.177.241 attackbotsspam
Sep 22 00:17:26 plex sshd[22552]: Invalid user sonos from 118.25.177.241 port 41422
2019-09-22 09:15:51
199.195.252.213 attackspambots
ssh failed login
2019-09-22 09:12:29
91.206.54.49 attackspam
Unauthorized connection attempt from IP address 91.206.54.49 on Port 445(SMB)
2019-09-22 09:40:02
222.188.29.161 attackspam
firewall-block, port(s): 22/tcp
2019-09-22 09:39:07
159.89.229.244 attackspam
Sep 22 02:37:56 MK-Soft-VM6 sshd[12759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244 
Sep 22 02:37:58 MK-Soft-VM6 sshd[12759]: Failed password for invalid user jboss from 159.89.229.244 port 44714 ssh2
...
2019-09-22 09:27:02
41.38.174.250 attackspam
SMB Server BruteForce Attack
2019-09-22 09:37:35
110.143.181.4 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.143.181.4/ 
 AU - 1H : (17)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN1221 
 
 IP : 110.143.181.4 
 
 CIDR : 110.143.0.0/16 
 
 PREFIX COUNT : 478 
 
 UNIQUE IP COUNT : 9948416 
 
 
 WYKRYTE ATAKI Z ASN1221 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-22 09:03:33
188.254.0.214 attackbots
Sep 21 15:23:58 lcdev sshd\[11077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.214  user=root
Sep 21 15:24:00 lcdev sshd\[11077\]: Failed password for root from 188.254.0.214 port 41896 ssh2
Sep 21 15:28:39 lcdev sshd\[11510\]: Invalid user admin from 188.254.0.214
Sep 21 15:28:39 lcdev sshd\[11510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.214
Sep 21 15:28:41 lcdev sshd\[11510\]: Failed password for invalid user admin from 188.254.0.214 port 55450 ssh2
2019-09-22 09:30:27

Recently Reported IPs

143.143.24.67 229.70.159.161 102.53.157.94 65.135.105.248
31.208.110.174 11.239.19.223 110.118.190.141 205.87.112.80
254.107.116.208 247.222.152.113 5.187.2.85 215.136.134.100
135.50.18.111 168.84.245.170 14.178.131.123 134.163.176.215
115.166.115.31 40.108.188.78 204.9.53.126 129.28.184.205