Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Telecom Italia S.p.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Jul 14 22:54:50 lively sshd[11155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.53.149.58  user=r.r
Jul 14 22:54:53 lively sshd[11155]: Failed password for r.r from 82.53.149.58 port 62340 ssh2
Jul 14 22:55:01 lively sshd[11155]: message repeated 4 times: [ Failed password for r.r from 82.53.149.58 port 62340 ssh2]
Jul 14 22:55:04 lively sshd[11155]: Failed password for r.r from 82.53.149.58 port 62340 ssh2
Jul 14 22:55:04 lively sshd[11155]: error: maximum authentication attempts exceeded for r.r from 82.53.149.58 port 62340 ssh2 [preauth]
Jul 14 22:55:04 lively sshd[11155]: Disconnecting authenticating user r.r 82.53.149.58 port 62340: Too many authentication failures [preauth]
Jul 14 22:55:04 lively sshd[11155]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.53.149.58  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=82.53.149.58
2019-07-15 13:38:30
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.53.149.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53679
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;82.53.149.58.			IN	A

;; AUTHORITY SECTION:
.			3195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 15 13:38:23 CST 2019
;; MSG SIZE  rcvd: 116
Host info
58.149.53.82.in-addr.arpa domain name pointer host58-149-dynamic.53-82-r.retail.telecomitalia.it.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
58.149.53.82.in-addr.arpa	name = host58-149-dynamic.53-82-r.retail.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.89.192.72 attackbotsspam
Unauthorized connection attempt detected from IP address 197.89.192.72 to port 23 [J]
2020-01-18 14:13:13
198.48.189.235 attackspam
Unauthorized connection attempt detected from IP address 198.48.189.235 to port 23 [J]
2020-01-18 13:47:46
189.0.44.2 attackbotsspam
Unauthorized connection attempt detected from IP address 189.0.44.2 to port 80 [J]
2020-01-18 14:14:37
84.136.174.186 attackspambots
Unauthorized connection attempt detected from IP address 84.136.174.186 to port 80 [J]
2020-01-18 14:05:07
43.245.218.177 attackbotsspam
Unauthorized connection attempt detected from IP address 43.245.218.177 to port 8080 [J]
2020-01-18 14:07:40
119.29.152.172 attack
Unauthorized connection attempt detected from IP address 119.29.152.172 to port 2220 [J]
2020-01-18 13:57:16
191.83.98.184 attackbotsspam
Unauthorized connection attempt detected from IP address 191.83.98.184 to port 80 [J]
2020-01-18 14:14:09
187.59.111.108 attack
Unauthorized connection attempt detected from IP address 187.59.111.108 to port 23 [J]
2020-01-18 13:50:16
45.17.162.182 attackbots
Jan 18 05:42:30 server sshd\[1260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-17-162-182.lightspeed.tukrga.sbcglobal.net  user=root
Jan 18 05:42:33 server sshd\[1260\]: Failed password for root from 45.17.162.182 port 47966 ssh2
Jan 18 08:14:44 server sshd\[7115\]: Invalid user test from 45.17.162.182
Jan 18 08:14:44 server sshd\[7115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45-17-162-182.lightspeed.tukrga.sbcglobal.net 
Jan 18 08:14:46 server sshd\[7115\]: Failed password for invalid user test from 45.17.162.182 port 39456 ssh2
...
2020-01-18 13:42:10
211.21.191.40 attackspam
Unauthorized connection attempt detected from IP address 211.21.191.40 to port 5888 [J]
2020-01-18 13:47:15
94.25.170.156 attackbots
Unauthorized connection attempt detected from IP address 94.25.170.156 to port 2220 [J]
2020-01-18 14:03:50
223.15.212.109 attack
Unauthorized connection attempt detected from IP address 223.15.212.109 to port 2323 [J]
2020-01-18 14:11:09
58.186.18.31 attack
Unauthorized connection attempt detected from IP address 58.186.18.31 to port 23 [J]
2020-01-18 13:39:36
84.255.190.40 attackspam
Unauthorized connection attempt detected from IP address 84.255.190.40 to port 81 [J]
2020-01-18 14:04:50
93.122.210.144 attackbots
Unauthorized connection attempt detected from IP address 93.122.210.144 to port 8000 [J]
2020-01-18 14:04:11

Recently Reported IPs

168.228.150.99 146.111.165.90 49.83.119.3 43.240.217.48
112.232.129.154 82.85.233.94 67.203.38.44 211.159.160.214
90.109.221.14 68.169.51.205 176.239.150.211 84.215.163.107
201.175.149.236 178.211.94.25 108.247.64.158 141.165.253.201
177.67.165.47 100.164.172.189 181.192.75.235 198.238.56.153