Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.12.211.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.12.211.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 02:15:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
48.211.12.191.in-addr.arpa domain name pointer 191-12-211-48.user.vivozap.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.211.12.191.in-addr.arpa	name = 191-12-211-48.user.vivozap.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.209.164.184 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-08 03:15:19
192.35.169.45 attackbotsspam
Automatic report - Banned IP Access
2020-10-08 03:36:54
198.12.157.28 attackspam
Dovecot Invalid User Login Attempt.
2020-10-08 03:11:36
49.235.221.172 attackspam
Invalid user romain from 49.235.221.172 port 56378
2020-10-08 03:39:08
145.239.82.174 attackspam
Oct  7 17:08:20 staging sshd[248663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.174  user=root
Oct  7 17:08:23 staging sshd[248663]: Failed password for root from 145.239.82.174 port 53738 ssh2
Oct  7 17:13:13 staging sshd[248699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.174  user=root
Oct  7 17:13:16 staging sshd[248699]: Failed password for root from 145.239.82.174 port 54000 ssh2
...
2020-10-08 03:36:34
142.93.154.174 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-08 03:14:31
89.248.172.16 attackbotsspam
- Port=2081
2020-10-08 03:13:38
192.35.168.230 attack
Port scan: Attack repeated for 24 hours
2020-10-08 03:38:04
177.67.109.207 attackspambots
SSH Bruteforce Attempt on Honeypot
2020-10-08 03:38:30
89.248.168.176 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 1064 proto: tcp cat: Misc Attackbytes: 60
2020-10-08 03:19:09
34.74.88.243 attackspam
Multiple web server 500 error code (Internal Error).
2020-10-08 03:03:19
88.214.26.29 attack
Multiport scan : 20 ports scanned 3380 3381 3382 3383 3384 3385 3386 3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399
2020-10-08 03:04:16
62.109.217.116 attackbots
recursive DNS query (.)
2020-10-08 03:28:25
104.236.45.171 attackbotsspam
Automatic report - Banned IP Access
2020-10-08 03:16:05
185.216.140.31 attackspam
Fail2Ban Ban Triggered
2020-10-08 03:24:15

Recently Reported IPs

224.72.60.47 203.153.174.46 118.36.221.107 209.4.198.131
253.18.13.153 35.85.2.247 239.200.240.100 167.144.93.210
46.141.173.171 161.175.100.72 162.124.79.152 171.48.7.236
106.8.197.253 56.225.213.168 145.219.165.226 9.200.205.108
21.10.39.17 18.144.97.154 138.213.218.189 171.19.191.220