Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.82.148.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.82.148.56.			IN	A

;; AUTHORITY SECTION:
.			528	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 05:26:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 56.148.82.65.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.148.82.65.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
98.214.86.3 attackbotsspam
Port scan on 1 port(s): 22
2020-10-07 07:33:11
104.140.80.4 attackbotsspam
Email rejected due to spam filtering
2020-10-07 07:13:31
51.38.159.166 attackspambots
Lines containing failures of 51.38.159.166
Oct  4 06:41:31 penfold postfix/smtpd[22846]: connect from ip166.ip-51-38-159.eu[51.38.159.166]
Oct  4 06:41:32 penfold postfix/smtpd[22846]: Anonymous TLS connection established from ip166.ip-51-38-159.eu[51.38.159.166]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames)
Oct  4 06:41:32 penfold postfix/smtpd[22846]: CD7DB20D19: client=ip166.ip-51-38-159.eu[51.38.159.166]
Oct  4 06:41:34 penfold opendkim[23058]: CD7DB20D19: ip166.ip-51-38-159.eu [51.38.159.166] not internal
Oct  4 06:41:38 penfold postfix/smtpd[22846]: disconnect from ip166.ip-51-38-159.eu[51.38.159.166] ehlo=2 starttls=1 mail=1 rcpt=1 data=1 quhostname=1 commands=7
Oct  5 15:52:21 penfold postfix/smtpd[17861]: connect from ip166.ip-51-38-159.eu[51.38.159.166]
Oct  5 15:52:21 penfold postfix/smtpd[17861]: Anonymous TLS connection established from ip166.ip-51-38-159.eu[51.38.159.166]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (........
------------------------------
2020-10-07 07:32:08
45.148.10.15 attackspambots
$f2bV_matches
2020-10-07 06:59:10
134.101.138.47 attackbots
Oct  5 22:38:37 alaska sshd[29486]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:43 alaska sshd[29496]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:48 alaska sshd[29506]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:53 alaska sshd[29527]: refused connect from 134.101.138.47 (134.101.138.47)
Oct  5 22:38:59 alaska sshd[29537]: refused connect from 134.101.138.47 (134.101.138.47)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=134.101.138.47
2020-10-07 07:31:13
187.138.57.140 attack
Oct  5 13:37:43 spidey sshd[32605]: Invalid user tech from 187.138.57.140 port 64008
Oct  5 13:37:43 spidey sshd[32603]: Invalid user tech from 187.138.57.140 port 64007
Oct  5 13:37:44 spidey sshd[32607]: Invalid user tech from 187.138.57.140 port 64016


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=187.138.57.140
2020-10-07 07:23:14
91.134.143.172 attack
Bruteforce detected by fail2ban
2020-10-07 07:07:14
181.48.134.66 attack
Oct  6 21:58:18 staging sshd[236290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66  user=root
Oct  6 21:58:20 staging sshd[236290]: Failed password for root from 181.48.134.66 port 52302 ssh2
Oct  6 22:13:15 staging sshd[236390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.134.66  user=root
Oct  6 22:13:17 staging sshd[236390]: Failed password for root from 181.48.134.66 port 51530 ssh2
...
2020-10-07 07:22:26
5.189.131.106 attackspam
Oct  6 23:38:46 ns382633 sshd\[23983\]: Invalid user admin from 5.189.131.106 port 45212
Oct  6 23:38:46 ns382633 sshd\[23983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.131.106
Oct  6 23:38:48 ns382633 sshd\[23983\]: Failed password for invalid user admin from 5.189.131.106 port 45212 ssh2
Oct  6 23:40:42 ns382633 sshd\[24360\]: Invalid user admin from 5.189.131.106 port 49366
Oct  6 23:40:42 ns382633 sshd\[24360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.131.106
2020-10-07 07:21:55
179.252.114.253 attack
Unauthorized connection attempt from IP address 179.252.114.253 on Port 445(SMB)
2020-10-07 07:17:00
159.89.114.40 attackbotsspam
IP blocked
2020-10-07 07:35:08
82.82.254.8 attackspam
Invalid user pi from 82.82.254.8 port 37890
2020-10-07 07:16:12
159.89.53.183 attackbotsspam
Port Scan
...
2020-10-07 07:01:42
109.73.42.146 attack
20/10/5@16:41:06: FAIL: Alarm-Network address from=109.73.42.146
...
2020-10-07 07:26:11
52.163.127.48 attackspambots
2020-10-06T06:24:23.065268hostname sshd[130367]: Failed password for root from 52.163.127.48 port 48552 ssh2
...
2020-10-07 07:36:22

Recently Reported IPs

2.81.28.23 232.197.112.14 131.139.91.121 254.98.219.13
71.108.160.53 165.108.251.77 40.245.77.239 238.207.206.205
234.126.83.102 153.56.220.35 5.114.97.150 117.52.87.225
49.212.20.238 235.250.176.195 20.209.98.73 60.109.145.41
198.152.8.31 241.134.68.9 143.240.223.60 219.104.14.35