Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hermitage

Region: Tennessee

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.148.82.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53846
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;97.148.82.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 00:17:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
213.82.148.97.in-addr.arpa domain name pointer 213.sub-97-148-82.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
213.82.148.97.in-addr.arpa	name = 213.sub-97-148-82.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.226.136 attackspambots
Brute force attempt
2019-07-28 16:14:35
139.59.34.17 attackbotsspam
Jul 28 07:23:34 XXX sshd[7269]: Invalid user applmgr from 139.59.34.17 port 41486
2019-07-28 16:22:49
177.138.147.186 attack
Port scan and direct access per IP instead of hostname
2019-07-28 15:40:14
177.44.26.40 attack
Jul 27 21:07:52 web1 postfix/smtpd[27874]: warning: unknown[177.44.26.40]: SASL PLAIN authentication failed: authentication failure
...
2019-07-28 15:43:41
103.54.250.103 attackbotsspam
Jul 28 09:57:58 vps647732 sshd[14675]: Failed password for root from 103.54.250.103 port 51122 ssh2
...
2019-07-28 16:16:22
163.172.70.143 attack
Jul 28 03:07:49 server postfix/smtpd[29638]: NOQUEUE: reject: RCPT from mail.eatingfit.me[163.172.70.143]: 554 5.7.1 Service unavailable; Client host [163.172.70.143] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-07-28 15:51:34
221.1.177.2 attackbotsspam
failed_logins
2019-07-28 16:33:44
168.63.250.142 attackspam
SSH/22 MH Probe, BF, Hack -
2019-07-28 16:43:10
174.97.237.86 attackbotsspam
POST / HTTP/1.1
2019-07-28 15:53:15
45.231.31.252 attack
10 attempts against mh_ha-misc-ban on pole.magehost.pro
2019-07-28 15:57:09
186.31.65.66 attackbots
Jul 28 07:07:56 sshgateway sshd\[30321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66  user=root
Jul 28 07:07:58 sshgateway sshd\[30321\]: Failed password for root from 186.31.65.66 port 48945 ssh2
Jul 28 07:13:09 sshgateway sshd\[30349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.65.66  user=root
2019-07-28 16:27:51
93.114.82.239 attack
Jul 28 09:00:59 mout sshd[8786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.114.82.239  user=root
Jul 28 09:01:01 mout sshd[8786]: Failed password for root from 93.114.82.239 port 57726 ssh2
2019-07-28 16:30:40
121.122.103.212 attackbots
28.07.2019 03:28:35 SSH access blocked by firewall
2019-07-28 16:30:19
170.239.228.62 attackbotsspam
Port scan and direct access per IP instead of hostname
2019-07-28 15:56:41
218.75.36.70 attack
failed_logins
2019-07-28 16:09:57

Recently Reported IPs

227.161.162.156 85.81.149.191 88.208.45.175 154.68.195.192
29.169.78.52 226.19.120.94 4.215.208.206 4.247.48.202
138.228.182.251 17.149.9.93 3.30.39.66 90.188.103.82
79.47.57.146 6.169.154.228 146.20.253.205 109.227.234.43
204.232.199.78 172.149.76.214 139.143.214.81 213.110.113.5