Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Budapest

Region: Budapest főváros

Country: Hungary

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.82.99.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.82.99.3.			IN	A

;; AUTHORITY SECTION:
.			435	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022082100 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 21 20:21:06 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 3.99.82.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.99.82.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.107.233.29 attackbots
Aug 15 17:26:04 apollo sshd\[23543\]: Invalid user ops from 118.107.233.29Aug 15 17:26:07 apollo sshd\[23543\]: Failed password for invalid user ops from 118.107.233.29 port 47445 ssh2Aug 15 17:37:50 apollo sshd\[23558\]: Invalid user jon from 118.107.233.29
...
2019-08-16 00:14:30
163.172.164.135 attack
fail2ban honeypot
2019-08-15 23:44:00
164.132.192.5 attackspambots
2019-08-15T15:14:29.947795abusebot-6.cloudsearch.cf sshd\[31294\]: Invalid user pushousi from 164.132.192.5 port 37058
2019-08-15 23:32:57
165.22.53.240 attackspam
Aug 15 13:46:52 eventyay sshd[30404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.53.240
Aug 15 13:46:54 eventyay sshd[30404]: Failed password for invalid user sybase from 165.22.53.240 port 46558 ssh2
Aug 15 13:52:17 eventyay sshd[31686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.53.240
...
2019-08-16 00:19:34
117.223.119.254 attackbotsspam
Automatic report - Port Scan Attack
2019-08-16 00:08:10
64.20.39.18 attack
WordPress wp-login brute force :: 64.20.39.18 0.048 BYPASS [15/Aug/2019:23:43:58  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-15 23:45:44
106.241.16.119 attack
Aug 15 04:54:20 sachi sshd\[11838\]: Invalid user cod1 from 106.241.16.119
Aug 15 04:54:21 sachi sshd\[11838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
Aug 15 04:54:22 sachi sshd\[11838\]: Failed password for invalid user cod1 from 106.241.16.119 port 40856 ssh2
Aug 15 04:59:33 sachi sshd\[12262\]: Invalid user sinusbot from 106.241.16.119
Aug 15 04:59:33 sachi sshd\[12262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.16.119
2019-08-15 23:41:42
49.88.112.80 attackspambots
Aug 15 05:52:13 kapalua sshd\[28415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
Aug 15 05:52:15 kapalua sshd\[28415\]: Failed password for root from 49.88.112.80 port 29099 ssh2
Aug 15 05:52:17 kapalua sshd\[28415\]: Failed password for root from 49.88.112.80 port 29099 ssh2
Aug 15 05:52:19 kapalua sshd\[28415\]: Failed password for root from 49.88.112.80 port 29099 ssh2
Aug 15 05:52:23 kapalua sshd\[28441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.80  user=root
2019-08-15 23:59:12
129.204.77.45 attackbotsspam
Aug 15 21:37:15 areeb-Workstation sshd\[23989\]: Invalid user dn from 129.204.77.45
Aug 15 21:37:15 areeb-Workstation sshd\[23989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.77.45
Aug 15 21:37:17 areeb-Workstation sshd\[23989\]: Failed password for invalid user dn from 129.204.77.45 port 41901 ssh2
...
2019-08-16 00:25:38
81.22.45.29 attackbots
08/15/2019-11:16:26.412069 81.22.45.29 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 85
2019-08-15 23:51:53
185.209.0.143 attackbotsspam
Aug 15 13:45:27 h2177944 kernel: \[4193245.361638\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=15086 PROTO=TCP SPT=43188 DPT=13308 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 15 13:52:07 h2177944 kernel: \[4193645.305558\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=63459 PROTO=TCP SPT=43188 DPT=13364 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 15 13:57:34 h2177944 kernel: \[4193972.537583\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=12597 PROTO=TCP SPT=43188 DPT=13369 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 15 14:05:55 h2177944 kernel: \[4194473.720251\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.143 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=47017 PROTO=TCP SPT=43188 DPT=13326 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 15 14:07:38 h2177944 kernel: \[4194576.491296\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.209.0.143 DST=85.214.1
2019-08-16 00:21:56
138.197.162.28 attack
Aug 15 03:25:51 aiointranet sshd\[20450\]: Invalid user ubuntu from 138.197.162.28
Aug 15 03:25:51 aiointranet sshd\[20450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.28
Aug 15 03:25:53 aiointranet sshd\[20450\]: Failed password for invalid user ubuntu from 138.197.162.28 port 45936 ssh2
Aug 15 03:30:14 aiointranet sshd\[20803\]: Invalid user kasia from 138.197.162.28
Aug 15 03:30:14 aiointranet sshd\[20803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.28
2019-08-15 23:51:28
129.211.117.47 attack
Aug 15 17:59:07 eventyay sshd[30242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.117.47
Aug 15 17:59:10 eventyay sshd[30242]: Failed password for invalid user toni from 129.211.117.47 port 44324 ssh2
Aug 15 18:05:17 eventyay sshd[31799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.117.47
...
2019-08-16 00:21:19
41.221.168.167 attackbotsspam
Aug 15 05:30:31 hanapaa sshd\[22623\]: Invalid user sheep from 41.221.168.167
Aug 15 05:30:31 hanapaa sshd\[22623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
Aug 15 05:30:33 hanapaa sshd\[22623\]: Failed password for invalid user sheep from 41.221.168.167 port 40986 ssh2
Aug 15 05:36:11 hanapaa sshd\[23137\]: Invalid user charles from 41.221.168.167
Aug 15 05:36:11 hanapaa sshd\[23137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.221.168.167
2019-08-15 23:41:06
151.69.229.18 attackspam
Aug 15 17:54:48 dedicated sshd[18264]: Invalid user fachwirt from 151.69.229.18 port 33909
2019-08-16 00:17:42

Recently Reported IPs

196.183.130.79 5.181.169.98 45.82.96.247 187.132.191.141
14.245.212.102 80.230.95.158 41.45.138.242 182.237.9.72
52.183.143.190 2804:18:838:df7:2173:2f5c:2781:3920 185.109.62.217 196.246.212.122
105.12.255.26 162.68.164.17 162.114.132.247 173.82.226.232
4.22.36.210 58.47.252.90 201.78.25.50 229.81.209.200