Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.29.82.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4170
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.29.82.172.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:40:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 172.82.29.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.82.29.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.166.132.33 attackspambots
Telnet Server BruteForce Attack
2019-11-26 16:57:35
113.62.176.98 attackbotsspam
Nov 26 09:58:37 OPSO sshd\[12145\]: Invalid user w from 113.62.176.98 port 34464
Nov 26 09:58:37 OPSO sshd\[12145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
Nov 26 09:58:39 OPSO sshd\[12145\]: Failed password for invalid user w from 113.62.176.98 port 34464 ssh2
Nov 26 10:01:43 OPSO sshd\[12906\]: Invalid user w from 113.62.176.98 port 54221
Nov 26 10:01:43 OPSO sshd\[12906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
2019-11-26 17:05:05
179.236.51.120 attackbots
Looks for open dns resolvers
2019-11-26 16:53:15
181.48.134.65 attack
Nov 26 09:29:34 MK-Soft-VM7 sshd[18137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.65 
Nov 26 09:29:35 MK-Soft-VM7 sshd[18137]: Failed password for invalid user melantha from 181.48.134.65 port 57158 ssh2
...
2019-11-26 17:11:13
130.61.61.147 attackbots
130.61.61.147 - - \[26/Nov/2019:07:27:12 +0100\] "GET /scripts/setup.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\; rv:57.0\) Gecko/20100101 Firefox/57.0"
130.61.61.147 - - \[26/Nov/2019:07:27:12 +0100\] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\; rv:57.0\) Gecko/20100101 Firefox/57.0"
130.61.61.147 - - \[26/Nov/2019:07:27:12 +0100\] "GET /mysql/scripts/setup.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\; rv:57.0\) Gecko/20100101 Firefox/57.0"
130.61.61.147 - - \[26/Nov/2019:07:27:12 +0100\] "GET /phpmyadmin/scripts/_setup.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\; rv:57.0\) Gecko/20100101 Firefox/57.0"
130.61.61.147 - - \[26/Nov/2019:07:27:12 +0100\] "GET /pma/scripts/setup.php HTTP/1.1" 404 162 "-" "Mozilla/5.0 \(Windows NT 10.0\; Win64\; x64\; rv:57.0\) Gecko/20100101 Firefox/57.0"
...
2019-11-26 17:02:35
179.106.159.204 attackbots
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-26 16:44:57
200.133.39.24 attackbots
Nov 26 09:52:29 OPSO sshd\[10926\]: Invalid user otemoyan from 200.133.39.24 port 47570
Nov 26 09:52:29 OPSO sshd\[10926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.133.39.24
Nov 26 09:52:31 OPSO sshd\[10926\]: Failed password for invalid user otemoyan from 200.133.39.24 port 47570 ssh2
Nov 26 09:59:50 OPSO sshd\[12225\]: Invalid user git from 200.133.39.24 port 54894
Nov 26 09:59:50 OPSO sshd\[12225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.133.39.24
2019-11-26 17:02:02
39.183.144.132 attack
Brute force attempt
2019-11-26 16:51:30
218.92.0.133 attack
Nov 26 09:22:48 dedicated sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Nov 26 09:22:50 dedicated sshd[23623]: Failed password for root from 218.92.0.133 port 40475 ssh2
2019-11-26 16:40:39
125.74.27.185 attackbots
Nov 26 09:12:00 sauna sshd[1487]: Failed password for root from 125.74.27.185 port 42229 ssh2
...
2019-11-26 16:53:44
106.54.121.34 attack
Nov 26 06:57:23 h2812830 sshd[16957]: Invalid user fritschi from 106.54.121.34 port 45276
Nov 26 06:57:23 h2812830 sshd[16957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.121.34
Nov 26 06:57:23 h2812830 sshd[16957]: Invalid user fritschi from 106.54.121.34 port 45276
Nov 26 06:57:24 h2812830 sshd[16957]: Failed password for invalid user fritschi from 106.54.121.34 port 45276 ssh2
Nov 26 07:27:28 h2812830 sshd[18992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.121.34  user=mysql
Nov 26 07:27:30 h2812830 sshd[18992]: Failed password for mysql from 106.54.121.34 port 48260 ssh2
...
2019-11-26 16:52:30
5.196.18.169 attackbots
Nov 26 09:36:19 SilenceServices sshd[3525]: Failed password for root from 5.196.18.169 port 36992 ssh2
Nov 26 09:42:32 SilenceServices sshd[5635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.18.169
Nov 26 09:42:34 SilenceServices sshd[5635]: Failed password for invalid user speech-dispatcher from 5.196.18.169 port 45208 ssh2
2019-11-26 16:43:29
106.12.15.235 attackspambots
Nov 26 03:00:49 *** sshd[23615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.235  user=r.r
Nov 26 03:00:52 *** sshd[23615]: Failed password for r.r from 106.12.15.235 port 38298 ssh2
Nov 26 03:00:52 *** sshd[23615]: Received disconnect from 106.12.15.235: 11: Bye Bye [preauth]
Nov 26 03:40:21 *** sshd[29720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.235  user=r.r
Nov 26 03:40:23 *** sshd[29720]: Failed password for r.r from 106.12.15.235 port 55282 ssh2
Nov 26 03:40:24 *** sshd[29720]: Received disconnect from 106.12.15.235: 11: Bye Bye [preauth]
Nov 26 03:47:48 *** sshd[30525]: Invalid user mail3user from 106.12.15.235
Nov 26 03:47:48 *** sshd[30525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.235 
Nov 26 03:47:49 *** sshd[30525]: Failed password for invalid user mail3user from 106.12.15.235 port 33002 ssh........
-------------------------------
2019-11-26 17:03:26
106.13.39.233 attack
Invalid user natasha from 106.13.39.233 port 42928
2019-11-26 16:46:21
223.245.213.61 attackspam
[Aegis] @ 2019-11-26 06:26:54  0000 -> Sendmail rejected message.
2019-11-26 17:10:26

Recently Reported IPs

203.148.51.54 186.249.134.98 26.172.145.109 59.88.72.16
53.225.80.115 33.231.147.103 199.31.159.163 249.25.186.82
19.150.26.215 242.88.143.54 136.133.204.226 31.210.185.54
93.192.96.26 224.205.224.24 250.91.236.140 206.117.195.218
7.25.180.31 40.176.221.168 209.101.39.242 224.209.181.148