Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.148.82.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.148.82.103.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020301 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:11:24 CST 2020
;; MSG SIZE  rcvd: 116
Host info
103.82.148.2.in-addr.arpa domain name pointer 2.148.82.103.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
103.82.148.2.in-addr.arpa	name = 2.148.82.103.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.226.185.201 attackspam
Sep  7 23:52:33 mellenthin sshd[23832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.185.201
Sep  7 23:52:34 mellenthin sshd[23832]: Failed password for invalid user test from 129.226.185.201 port 53444 ssh2
2020-09-08 16:13:43
111.229.50.131 attack
Sep  8 10:23:38 root sshd[9648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.131 
Sep  8 10:27:20 root sshd[13611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.50.131 
...
2020-09-08 16:53:21
173.163.8.58 attackspam
port scan and connect, tcp 23 (telnet)
2020-09-08 16:33:45
37.187.113.197 attackbotsspam
37.187.113.197 - - [08/Sep/2020:09:17:12 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.113.197 - - [08/Sep/2020:09:26:00 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-08 16:50:57
121.122.172.117 attackspambots
firewall-block, port(s): 23/tcp
2020-09-08 16:31:43
45.118.144.77 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-09-08 16:28:49
116.118.238.18 attack
Brute Force
2020-09-08 16:20:45
112.47.57.80 attackspam
Aug 21 19:40:25 server postfix/smtpd[26473]: warning: unknown[112.47.57.80]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 21 19:40:33 server postfix/smtpd[26469]: warning: unknown[112.47.57.80]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 21 19:40:45 server postfix/smtpd[26473]: warning: unknown[112.47.57.80]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-08 16:42:31
208.115.198.54 attackspambots
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(09081006)
2020-09-08 16:27:37
74.64.243.192 attackbots
Brute-force attempt banned
2020-09-08 16:20:16
68.204.88.29 attackspambots
Honeypot attack, port: 81, PTR: 68-204-88-29.res.bhn.net.
2020-09-08 16:13:01
122.54.8.10 attackspam
Honeypot attack, port: 445, PTR: igate10.fastcargo.com.ph.
2020-09-08 16:32:09
2.57.121.112 attack
Port scanning [4 denied]
2020-09-08 16:49:23
147.135.203.181 attackbotsspam
Sep  8 10:08:25 haigwepa sshd[27500]: Failed password for root from 147.135.203.181 port 50754 ssh2
...
2020-09-08 16:22:37
124.204.65.82 attack
Sep  8 07:56:27 game-panel sshd[18096]: Failed password for root from 124.204.65.82 port 44943 ssh2
Sep  8 07:59:16 game-panel sshd[18198]: Failed password for root from 124.204.65.82 port 21354 ssh2
2020-09-08 16:15:34

Recently Reported IPs

166.62.176.89 70.111.84.17 120.146.182.140 44.193.242.214
125.71.59.104 176.252.193.241 120.125.232.171 88.241.116.244
190.237.121.47 95.58.121.135 201.148.146.213 178.145.140.181
84.220.243.109 68.124.121.35 56.202.92.69 72.192.36.83
128.138.157.170 80.38.139.178 147.55.42.51 79.179.14.212