Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.93.91.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.93.91.48.			IN	A

;; AUTHORITY SECTION:
.			274	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 03:13:45 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 48.91.93.82.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.91.93.82.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
156.146.58.201 attackspam
(From adam.miles@businesspromoted.in) brombergchiropractic.com is currently receiving  33.4  clicks from organic traffic. However, your competition is crushing it  You can view detailed traffic analysis at  https://www.spyfu.com/overview/domain?query=brombergchiropractic.com

33.4  clicks are certainly not enough. We can certainly do better! We need to do better. It is not that difficult. With in-depth keyword research and on-page optimization it is doable. We will reverse engineer competitor's link building strategies and get the links from similar sources. 

Its perfect time to plan your marketing strategy. You have created good website but your site will not rank in Google until content and images are  optimized correctly. We need to optimize your website for search engines and make it search engine friendly. 

I have analyzed your site in-depth and you can view your website audit report at

https://businesspromoted.websiteauditserver.com/brombergchiropractic.com

Your website is the reflection o
2020-08-15 20:34:55
173.252.95.35 attackspambots
[Sat Aug 15 19:25:50.690691 2020] [:error] [pid 3316:tid 140592583423744] [client 173.252.95.35:45702] [client 173.252.95.35] ModSecurity: Access denied with code 403 (phase 2). Match of "eq 0" against "&REQUEST_HEADERS:Transfer-Encoding" required. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "202"] [id "920171"] [msg "GET or HEAD Request with Transfer-Encoding."] [data "1"] [severity "CRITICAL"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/INVALID_HREQ"] [tag "CAPEC-272"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/prakiraan-bulanan/prakiraan-daerah-potensi-banjir-di-provinsi-jawa-timur/555558208-prakiraan-bulanan-daerah-potensi-banjir-di-provinsi-jawa-timur-untuk-bulan-september-tahun-2020-update-10-agustus-2020"] [unique_id "XzfUTua0Xgxjnrgkau-8LgACeAM"]
...
2020-08-15 20:38:36
112.85.42.104 attackbots
Aug 15 14:20:38 amit sshd\[1314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
Aug 15 14:20:40 amit sshd\[1314\]: Failed password for root from 112.85.42.104 port 28163 ssh2
Aug 15 14:20:47 amit sshd\[1317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
...
2020-08-15 20:24:49
160.20.20.212 attackbots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-08-15 20:12:38
167.172.117.26 attackspambots
Aug 15 14:21:57 vps639187 sshd\[13509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.117.26  user=root
Aug 15 14:21:59 vps639187 sshd\[13509\]: Failed password for root from 167.172.117.26 port 32962 ssh2
Aug 15 14:25:40 vps639187 sshd\[13572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.117.26  user=root
...
2020-08-15 20:42:27
110.137.38.136 attackbots
1597494362 - 08/15/2020 14:26:02 Host: 110.137.38.136/110.137.38.136 Port: 445 TCP Blocked
2020-08-15 20:26:59
192.241.172.175 attackspam
2020-08-15T12:01:49.053653shield sshd\[16844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.172.175  user=root
2020-08-15T12:01:51.312909shield sshd\[16844\]: Failed password for root from 192.241.172.175 port 59838 ssh2
2020-08-15T12:06:27.663545shield sshd\[17259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.172.175  user=root
2020-08-15T12:06:29.900140shield sshd\[17259\]: Failed password for root from 192.241.172.175 port 41760 ssh2
2020-08-15T12:11:14.649698shield sshd\[17700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.172.175  user=root
2020-08-15 20:21:26
61.177.172.142 attackbotsspam
Aug 15 12:25:41 game-panel sshd[2631]: Failed password for root from 61.177.172.142 port 19910 ssh2
Aug 15 12:25:44 game-panel sshd[2631]: Failed password for root from 61.177.172.142 port 19910 ssh2
Aug 15 12:25:47 game-panel sshd[2631]: Failed password for root from 61.177.172.142 port 19910 ssh2
Aug 15 12:25:50 game-panel sshd[2631]: Failed password for root from 61.177.172.142 port 19910 ssh2
2020-08-15 20:37:14
101.231.166.39 attackbotsspam
Aug 15 05:48:14 serwer sshd\[16073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.166.39  user=root
Aug 15 05:48:15 serwer sshd\[16073\]: Failed password for root from 101.231.166.39 port 2061 ssh2
Aug 15 05:50:18 serwer sshd\[17657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.166.39  user=root
...
2020-08-15 20:23:12
103.90.233.35 attack
$f2bV_matches
2020-08-15 20:10:36
49.88.112.76 attackspambots
Aug 15 09:05:23 ws24vmsma01 sshd[169770]: Failed password for root from 49.88.112.76 port 30475 ssh2
...
2020-08-15 20:23:28
54.37.17.21 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-08-15 20:12:06
185.172.111.221 attack
Unauthorised access (Aug 15) SRC=185.172.111.221 LEN=40 TTL=53 ID=13003 TCP DPT=8080 WINDOW=46923 SYN 
Unauthorised access (Aug 13) SRC=185.172.111.221 LEN=40 TTL=53 ID=34227 TCP DPT=8080 WINDOW=31720 SYN 
Unauthorised access (Aug 12) SRC=185.172.111.221 LEN=40 TTL=53 ID=36865 TCP DPT=8080 WINDOW=31720 SYN 
Unauthorised access (Aug 12) SRC=185.172.111.221 LEN=40 TTL=53 ID=24705 TCP DPT=8080 WINDOW=46923 SYN 
Unauthorised access (Aug 12) SRC=185.172.111.221 LEN=40 TTL=53 ID=5523 TCP DPT=8080 WINDOW=31720 SYN 
Unauthorised access (Aug 12) SRC=185.172.111.221 LEN=40 TTL=53 ID=39167 TCP DPT=8080 WINDOW=46923 SYN 
Unauthorised access (Aug  9) SRC=185.172.111.221 LEN=40 TTL=53 ID=60189 TCP DPT=8080 WINDOW=31720 SYN 
Unauthorised access (Aug  9) SRC=185.172.111.221 LEN=40 TTL=53 ID=24166 TCP DPT=8080 WINDOW=46923 SYN
2020-08-15 20:43:25
36.82.250.138 attack
1597463237 - 08/15/2020 05:47:17 Host: 36.82.250.138/36.82.250.138 Port: 445 TCP Blocked
2020-08-15 20:25:32
124.236.22.12 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-15 20:33:29

Recently Reported IPs

20.6.87.0 233.75.124.249 71.236.185.184 10.98.40.199
86.70.74.205 110.67.116.46 185.114.192.192 50.245.60.33
62.91.137.70 138.102.244.239 207.16.229.250 167.248.133.39
123.26.133.240 208.0.88.38 66.97.229.239 44.143.82.96
83.231.191.169 79.202.234.121 233.247.249.196 242.33.144.179