Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bad Sauerbrunn

Region: Burgenland

Country: Austria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.149.99.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45158
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.149.99.57.			IN	A

;; AUTHORITY SECTION:
.			476	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051601 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 06:42:05 CST 2020
;; MSG SIZE  rcvd: 116
Host info
57.99.149.82.in-addr.arpa domain name pointer 82-149-99-57.wco.wellcom.at.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.99.149.82.in-addr.arpa	name = 82-149-99-57.wco.wellcom.at.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.48.4.15 attackbotsspam
Dec  8 06:27:06 ns381471 sshd[15132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Dec  8 06:27:08 ns381471 sshd[15132]: Failed password for invalid user fanuha from 201.48.4.15 port 36964 ssh2
2019-12-08 13:52:02
61.177.172.128 attackbotsspam
Dec  8 06:32:40 MK-Soft-VM6 sshd[451]: Failed password for root from 61.177.172.128 port 44359 ssh2
Dec  8 06:32:45 MK-Soft-VM6 sshd[451]: Failed password for root from 61.177.172.128 port 44359 ssh2
...
2019-12-08 13:41:26
5.39.88.60 attackspam
Dec  7 19:30:45 php1 sshd\[25116\]: Invalid user Taru from 5.39.88.60
Dec  7 19:30:45 php1 sshd\[25116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.88.60
Dec  7 19:30:47 php1 sshd\[25116\]: Failed password for invalid user Taru from 5.39.88.60 port 51798 ssh2
Dec  7 19:37:31 php1 sshd\[25858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.88.60  user=root
Dec  7 19:37:32 php1 sshd\[25858\]: Failed password for root from 5.39.88.60 port 33052 ssh2
2019-12-08 13:39:50
95.239.205.196 attackspam
1575781021 - 12/08/2019 05:57:01 Host: 95.239.205.196/95.239.205.196 Port: 6001 TCP Blocked
2019-12-08 13:31:35
162.243.252.82 attack
Dec  7 19:38:04 eddieflores sshd\[6644\]: Invalid user test from 162.243.252.82
Dec  7 19:38:04 eddieflores sshd\[6644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.252.82
Dec  7 19:38:07 eddieflores sshd\[6644\]: Failed password for invalid user test from 162.243.252.82 port 43115 ssh2
Dec  7 19:46:34 eddieflores sshd\[7499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.252.82  user=root
Dec  7 19:46:36 eddieflores sshd\[7499\]: Failed password for root from 162.243.252.82 port 48042 ssh2
2019-12-08 13:49:29
218.95.137.199 attackbots
Dec  8 05:12:37 pi sshd\[21743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.137.199
Dec  8 05:12:39 pi sshd\[21743\]: Failed password for invalid user ravindaran from 218.95.137.199 port 36050 ssh2
Dec  8 05:20:06 pi sshd\[22215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.95.137.199  user=root
Dec  8 05:20:08 pi sshd\[22215\]: Failed password for root from 218.95.137.199 port 35866 ssh2
Dec  8 05:27:21 pi sshd\[22592\]: Invalid user aabbcc from 218.95.137.199 port 35682
...
2019-12-08 13:32:07
129.211.14.39 attack
--- report ---
Dec  8 01:55:19 sshd: Connection from 129.211.14.39 port 51316
Dec  8 01:55:20 sshd: Invalid user router from 129.211.14.39
Dec  8 01:55:20 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.14.39
Dec  8 01:55:22 sshd: Failed password for invalid user router from 129.211.14.39 port 51316 ssh2
Dec  8 01:55:23 sshd: Received disconnect from 129.211.14.39: 11: Bye Bye [preauth]
2019-12-08 13:29:26
103.100.209.174 attack
Dec  8 00:09:32 ny01 sshd[8171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.100.209.174
Dec  8 00:09:33 ny01 sshd[8171]: Failed password for invalid user bosco from 103.100.209.174 port 55759 ssh2
Dec  8 00:15:37 ny01 sshd[9262]: Failed password for root from 103.100.209.174 port 33886 ssh2
2019-12-08 13:19:47
113.164.244.98 attackspam
Dec  8 06:10:30 legacy sshd[13518]: Failed password for root from 113.164.244.98 port 45044 ssh2
Dec  8 06:17:01 legacy sshd[13893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.164.244.98
Dec  8 06:17:03 legacy sshd[13893]: Failed password for invalid user sherk from 113.164.244.98 port 57104 ssh2
...
2019-12-08 13:25:14
51.38.80.173 attack
Dec  8 05:52:04 v22018086721571380 sshd[7239]: Failed password for invalid user rimmler from 51.38.80.173 port 35624 ssh2
2019-12-08 13:37:27
178.62.90.135 attack
Dec  8 05:56:49 icinga sshd[11008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.90.135
Dec  8 05:56:51 icinga sshd[11008]: Failed password for invalid user host from 178.62.90.135 port 34397 ssh2
...
2019-12-08 13:42:23
43.242.212.81 attack
Dec  7 18:51:17 sachi sshd\[16394\]: Invalid user priyani from 43.242.212.81
Dec  7 18:51:17 sachi sshd\[16394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.212.81
Dec  7 18:51:19 sachi sshd\[16394\]: Failed password for invalid user priyani from 43.242.212.81 port 40792 ssh2
Dec  7 18:57:22 sachi sshd\[17036\]: Invalid user hanser from 43.242.212.81
Dec  7 18:57:22 sachi sshd\[17036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.242.212.81
2019-12-08 13:13:27
186.249.150.23 attack
Automatic report - Port Scan Attack
2019-12-08 13:49:01
159.65.112.93 attackspam
2019-12-08T06:03:17.908414scmdmz1 sshd\[5439\]: Invalid user orrick from 159.65.112.93 port 54712
2019-12-08T06:03:17.911629scmdmz1 sshd\[5439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93
2019-12-08T06:03:19.855323scmdmz1 sshd\[5439\]: Failed password for invalid user orrick from 159.65.112.93 port 54712 ssh2
...
2019-12-08 13:23:10
140.143.197.232 attack
Dec  7 23:49:39 ny01 sshd[5259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.197.232
Dec  7 23:49:42 ny01 sshd[5259]: Failed password for invalid user operator from 140.143.197.232 port 58430 ssh2
Dec  7 23:57:05 ny01 sshd[6422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.197.232
2019-12-08 13:27:33

Recently Reported IPs

187.166.38.247 32.169.194.136 177.120.232.49 113.7.116.159
39.95.226.252 31.48.134.229 41.250.79.141 218.199.137.27
89.82.255.114 148.211.76.228 210.212.172.250 49.148.126.15
189.75.15.30 120.201.54.94 109.51.140.125 187.185.33.115
71.224.23.154 144.132.153.46 73.137.144.176 162.157.54.200