Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.82.158.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.82.158.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:28:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 215.158.82.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.158.82.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.185 attack
Aug 12 18:31:32 MK-Soft-VM4 sshd\[8913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.185  user=root
Aug 12 18:31:34 MK-Soft-VM4 sshd\[8913\]: Failed password for root from 218.92.0.185 port 24049 ssh2
Aug 12 18:31:36 MK-Soft-VM4 sshd\[8913\]: Failed password for root from 218.92.0.185 port 24049 ssh2
...
2019-08-13 03:49:08
124.158.179.23 attackbots
445/tcp 445/tcp
[2019-07-19/08-12]2pkt
2019-08-13 03:56:16
180.126.15.243 attackspambots
SSH Bruteforce attempt
2019-08-13 04:11:52
85.23.199.113 attackbotsspam
SSH login attempts brute force.
2019-08-13 04:25:06
222.111.192.52 attack
Telnet Server BruteForce Attack
2019-08-13 04:09:58
185.183.103.101 attackbotsspam
Aug 12 12:34:11  postfix/smtpd: warning: unknown[185.183.103.101]: SASL LOGIN authentication failed
2019-08-13 03:57:01
201.17.243.201 attack
445/tcp 445/tcp 445/tcp...
[2019-07-09/08-12]4pkt,1pt.(tcp)
2019-08-13 04:27:24
118.70.124.172 attackbots
445/tcp 445/tcp
[2019-07-27/08-12]2pkt
2019-08-13 04:13:43
2.153.184.166 attackbots
Aug 12 16:43:18 cp sshd[14223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.153.184.166
2019-08-13 04:24:32
212.199.194.25 attack
445/tcp 445/tcp 445/tcp...
[2019-06-15/08-12]4pkt,1pt.(tcp)
2019-08-13 03:48:22
88.81.238.245 attackbotsspam
Chat Spam
2019-08-13 04:04:23
106.12.24.108 attack
Aug 12 16:17:40 ubuntu-2gb-nbg1-dc3-1 sshd[13183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.108
Aug 12 16:17:42 ubuntu-2gb-nbg1-dc3-1 sshd[13183]: Failed password for invalid user password1234 from 106.12.24.108 port 50540 ssh2
...
2019-08-13 03:59:44
113.161.21.95 attack
445/tcp 445/tcp
[2019-07-09/08-12]2pkt
2019-08-13 04:26:11
27.31.103.40 attackspambots
Aug 12 19:04:30 localhost postfix/smtpd\[13192\]: warning: unknown\[27.31.103.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 19:04:38 localhost postfix/smtpd\[13122\]: warning: unknown\[27.31.103.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 19:04:50 localhost postfix/smtpd\[13192\]: warning: unknown\[27.31.103.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 19:05:06 localhost postfix/smtpd\[13122\]: warning: unknown\[27.31.103.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 19:05:14 localhost postfix/smtpd\[13192\]: warning: unknown\[27.31.103.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-13 04:11:22
34.80.72.249 attackbotsspam
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:38 tuxlinux sshd[47185]: Invalid user nathan from 34.80.72.249 port 46656
Aug 12 20:52:38 tuxlinux sshd[47185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.80.72.249 
Aug 12 20:52:40 tuxlinux sshd[47185]: Failed password for invalid user nathan from 34.80.72.249 port 46656 ssh2
...
2019-08-13 04:12:58

Recently Reported IPs

20.31.46.152 127.19.252.253 41.241.121.60 93.37.198.245
235.112.183.50 21.230.166.5 30.63.166.122 59.87.79.46
250.7.139.109 212.222.116.19 44.44.252.1 215.160.84.158
190.100.28.102 71.13.157.102 169.160.1.88 49.241.233.67
13.98.139.144 232.79.73.97 51.207.97.73 173.234.63.105