Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.103.149.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39238
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.103.149.11.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 07 05:09:54 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 11.149.103.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.149.103.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.38.144.179 attackspambots
May 10 16:38:00 vmanager6029 postfix/smtpd\[7468\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 10 16:38:37 vmanager6029 postfix/smtpd\[7468\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-10 22:41:24
175.24.18.86 attack
Brute force SMTP login attempted.
...
2020-05-10 22:33:31
120.148.222.243 attack
2020-05-10T13:53:44.844843shield sshd\[8907\]: Invalid user user from 120.148.222.243 port 56045
2020-05-10T13:53:44.849067shield sshd\[8907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.148.222.243
2020-05-10T13:53:46.558391shield sshd\[8907\]: Failed password for invalid user user from 120.148.222.243 port 56045 ssh2
2020-05-10T13:58:51.209004shield sshd\[10244\]: Invalid user postgres from 120.148.222.243 port 58937
2020-05-10T13:58:51.214184shield sshd\[10244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.148.222.243
2020-05-10 22:27:45
181.48.18.129 attackbots
prod6
...
2020-05-10 22:40:19
185.38.3.138 attackspambots
2020-05-10T13:32:02.796704randservbullet-proofcloud-66.localdomain sshd[24424]: Invalid user sammy from 185.38.3.138 port 56096
2020-05-10T13:32:02.805433randservbullet-proofcloud-66.localdomain sshd[24424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net
2020-05-10T13:32:02.796704randservbullet-proofcloud-66.localdomain sshd[24424]: Invalid user sammy from 185.38.3.138 port 56096
2020-05-10T13:32:04.774446randservbullet-proofcloud-66.localdomain sshd[24424]: Failed password for invalid user sammy from 185.38.3.138 port 56096 ssh2
...
2020-05-10 22:16:35
178.128.56.89 attackbotsspam
May 10 15:05:56 localhost sshd\[23385\]: Invalid user test from 178.128.56.89
May 10 15:05:56 localhost sshd\[23385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.56.89
May 10 15:05:58 localhost sshd\[23385\]: Failed password for invalid user test from 178.128.56.89 port 58870 ssh2
May 10 15:08:36 localhost sshd\[23437\]: Invalid user nina from 178.128.56.89
May 10 15:08:36 localhost sshd\[23437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.56.89
...
2020-05-10 22:15:50
177.12.227.131 attackbotsspam
May 10 12:33:18 onepixel sshd[2775424]: Failed password for invalid user mu from 177.12.227.131 port 53032 ssh2
May 10 12:38:20 onepixel sshd[2777933]: Invalid user mary from 177.12.227.131 port 9709
May 10 12:38:20 onepixel sshd[2777933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.12.227.131 
May 10 12:38:20 onepixel sshd[2777933]: Invalid user mary from 177.12.227.131 port 9709
May 10 12:38:22 onepixel sshd[2777933]: Failed password for invalid user mary from 177.12.227.131 port 9709 ssh2
2020-05-10 22:25:02
141.98.9.159 attackspam
May 10 16:22:01 srv01 sshd[24254]: Invalid user admin from 141.98.9.159 port 33671
May 10 16:22:01 srv01 sshd[24254]: Failed none for invalid user admin from 141.98.9.159 port 33671 ssh2
May 10 16:22:01 srv01 sshd[24254]: Invalid user admin from 141.98.9.159 port 33671
May 10 16:22:01 srv01 sshd[24254]: Failed none for invalid user admin from 141.98.9.159 port 33671 ssh2
May 10 16:22:01 srv01 sshd[24254]: Invalid user admin from 141.98.9.159 port 33671
May 10 16:22:01 srv01 sshd[24254]: Failed none for invalid user admin from 141.98.9.159 port 33671 ssh2
...
2020-05-10 22:54:16
198.108.67.55 attackspambots
05/10/2020-08:13:43.206554 198.108.67.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-10 22:44:04
159.89.167.59 attackbotsspam
2020-05-10T12:09:24.383675abusebot-8.cloudsearch.cf sshd[26578]: Invalid user video from 159.89.167.59 port 50628
2020-05-10T12:09:24.396531abusebot-8.cloudsearch.cf sshd[26578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.167.59
2020-05-10T12:09:24.383675abusebot-8.cloudsearch.cf sshd[26578]: Invalid user video from 159.89.167.59 port 50628
2020-05-10T12:09:26.718699abusebot-8.cloudsearch.cf sshd[26578]: Failed password for invalid user video from 159.89.167.59 port 50628 ssh2
2020-05-10T12:13:28.711581abusebot-8.cloudsearch.cf sshd[26780]: Invalid user admin from 159.89.167.59 port 58862
2020-05-10T12:13:28.719919abusebot-8.cloudsearch.cf sshd[26780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.167.59
2020-05-10T12:13:28.711581abusebot-8.cloudsearch.cf sshd[26780]: Invalid user admin from 159.89.167.59 port 58862
2020-05-10T12:13:30.204158abusebot-8.cloudsearch.cf sshd[26780]: Failed
...
2020-05-10 22:55:15
159.89.207.146 attackbotsspam
Brute force attempt
2020-05-10 22:14:26
212.64.71.225 attackspambots
fail2ban -- 212.64.71.225
...
2020-05-10 22:45:59
206.189.139.179 attack
May 10 13:34:14 ip-172-31-62-245 sshd\[24315\]: Invalid user jamil from 206.189.139.179\
May 10 13:34:17 ip-172-31-62-245 sshd\[24315\]: Failed password for invalid user jamil from 206.189.139.179 port 38068 ssh2\
May 10 13:37:18 ip-172-31-62-245 sshd\[24334\]: Invalid user test from 206.189.139.179\
May 10 13:37:20 ip-172-31-62-245 sshd\[24334\]: Failed password for invalid user test from 206.189.139.179 port 50650 ssh2\
May 10 13:40:04 ip-172-31-62-245 sshd\[24418\]: Invalid user dev from 206.189.139.179\
2020-05-10 22:55:33
52.117.32.56 attack
2020-05-10T15:22:28.898609v22018076590370373 sshd[25019]: Invalid user hcpark from 52.117.32.56 port 53344
2020-05-10T15:22:28.905123v22018076590370373 sshd[25019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.117.32.56
2020-05-10T15:22:28.898609v22018076590370373 sshd[25019]: Invalid user hcpark from 52.117.32.56 port 53344
2020-05-10T15:22:31.072183v22018076590370373 sshd[25019]: Failed password for invalid user hcpark from 52.117.32.56 port 53344 ssh2
2020-05-10T15:26:03.293216v22018076590370373 sshd[8599]: Invalid user oracle from 52.117.32.56 port 34536
...
2020-05-10 22:45:23
78.153.108.216 attackbotsspam
1589112826 - 05/10/2020 14:13:46 Host: 78.153.108.216/78.153.108.216 Port: 445 TCP Blocked
2020-05-10 22:36:49

Recently Reported IPs

187.180.168.57 27.60.79.252 162.189.70.230 229.244.107.161
48.56.246.213 245.225.142.68 250.145.132.195 37.64.152.251
8.39.64.215 204.2.247.72 148.197.51.28 93.135.0.80
191.143.95.85 225.168.228.59 240.24.76.46 13.219.98.210
107.158.24.111 146.251.89.64 45.200.48.28 21.247.22.172