Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.201.49.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48504
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.201.49.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 12:14:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 148.49.201.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.49.201.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.120.38.28 attack
Sep 23 03:58:39 anodpoucpklekan sshd[95530]: Invalid user miao from 202.120.38.28 port 8098
...
2019-09-23 12:16:14
117.102.118.122 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:39.
2019-09-23 09:29:45
178.33.12.237 attackspam
Sep 23 01:38:18 lnxmysql61 sshd[28903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.12.237
2019-09-23 09:27:31
111.231.215.244 attackspambots
2019-09-23T00:01:14.9757561495-001 sshd\[17759\]: Invalid user bitnami from 111.231.215.244 port 21538
2019-09-23T00:01:14.9793291495-001 sshd\[17759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.215.244
2019-09-23T00:01:17.1311901495-001 sshd\[17759\]: Failed password for invalid user bitnami from 111.231.215.244 port 21538 ssh2
2019-09-23T00:05:42.0281031495-001 sshd\[17999\]: Invalid user elastic from 111.231.215.244 port 50558
2019-09-23T00:05:42.0312341495-001 sshd\[17999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.215.244
2019-09-23T00:05:43.9728311495-001 sshd\[17999\]: Failed password for invalid user elastic from 111.231.215.244 port 50558 ssh2
...
2019-09-23 12:20:32
114.37.80.164 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:36.
2019-09-23 09:30:14
79.143.180.147 attack
Sep 22 18:10:59 sachi sshd\[25369\]: Invalid user 12345 from 79.143.180.147
Sep 22 18:10:59 sachi sshd\[25369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi293344.contaboserver.net
Sep 22 18:11:01 sachi sshd\[25369\]: Failed password for invalid user 12345 from 79.143.180.147 port 43340 ssh2
Sep 22 18:15:16 sachi sshd\[25722\]: Invalid user cj from 79.143.180.147
Sep 22 18:15:16 sachi sshd\[25722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi293344.contaboserver.net
2019-09-23 12:23:49
106.12.126.42 attackbots
Sep 23 05:54:06 markkoudstaal sshd[15690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42
Sep 23 05:54:08 markkoudstaal sshd[15690]: Failed password for invalid user arkserver from 106.12.126.42 port 60240 ssh2
Sep 23 05:58:57 markkoudstaal sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.126.42
2019-09-23 12:03:45
222.186.31.136 attackbots
2019-09-23T04:06:24.070617abusebot-3.cloudsearch.cf sshd\[10012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.136  user=root
2019-09-23 12:06:47
112.225.169.51 attackbots
Unauthorised access (Sep 23) SRC=112.225.169.51 LEN=40 TTL=49 ID=33712 TCP DPT=8080 WINDOW=13137 SYN
2019-09-23 12:19:09
222.186.175.215 attackbots
DATE:2019-09-23 05:50:49, IP:222.186.175.215, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc-bis)
2019-09-23 12:02:16
139.59.80.65 attackspam
Sep 23 02:25:59 dedicated sshd[12227]: Invalid user bot from 139.59.80.65 port 46030
2019-09-23 09:31:42
118.70.176.61 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 22:00:40.
2019-09-23 09:25:06
106.75.141.160 attack
Sep 23 05:55:03 markkoudstaal sshd[15774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
Sep 23 05:55:05 markkoudstaal sshd[15774]: Failed password for invalid user olivia from 106.75.141.160 port 60364 ssh2
Sep 23 05:58:46 markkoudstaal sshd[16150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
2019-09-23 12:11:27
178.62.118.53 attack
Sep 23 06:01:17 vps01 sshd[20214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.118.53
Sep 23 06:01:20 vps01 sshd[20214]: Failed password for invalid user faxes from 178.62.118.53 port 55541 ssh2
2019-09-23 12:19:35
103.228.112.45 attackbotsspam
Sep 22 15:00:13 auw2 sshd\[29314\]: Invalid user eggdrop from 103.228.112.45
Sep 22 15:00:13 auw2 sshd\[29314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.45
Sep 22 15:00:15 auw2 sshd\[29314\]: Failed password for invalid user eggdrop from 103.228.112.45 port 38366 ssh2
Sep 22 15:05:51 auw2 sshd\[29825\]: Invalid user ph from 103.228.112.45
Sep 22 15:05:51 auw2 sshd\[29825\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.45
2019-09-23 09:15:57

Recently Reported IPs

157.171.46.56 239.69.37.197 92.130.113.238 197.239.240.171
123.236.192.50 86.188.101.138 135.28.76.6 178.148.166.10
22.215.118.224 244.144.168.247 9.236.15.17 18.189.206.2
198.140.220.52 242.168.208.151 16.226.229.208 232.115.72.12
169.234.191.86 115.104.195.66 186.130.206.233 15.254.251.187