Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Itapira

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: TELEFÔNICA BRASIL S.A

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
191.19.193.148 attack
firewall-block, port(s): 8080/tcp
2019-08-13 21:04:30
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.19.193.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63609
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.19.193.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060801 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jun 09 02:53:08 CST 2019
;; MSG SIZE  rcvd: 117

Host info
48.193.19.191.in-addr.arpa domain name pointer 191-19-193-48.user.vivozap.com.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
48.193.19.191.in-addr.arpa	name = 191-19-193-48.user.vivozap.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
37.187.54.45 attackbotsspam
2019-08-18T23:17:24.206986abusebot-6.cloudsearch.cf sshd\[25746\]: Invalid user group3 from 37.187.54.45 port 55150
2019-08-19 07:42:32
223.226.123.91 attack
$f2bV_matches
2019-08-19 07:14:13
45.126.22.162 attackbotsspam
[Sun Aug 18 22:47:51.314260 2019] [authz_core:error] [pid 2483] [client 45.126.22.162:41810] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org/drupal/comment/reply/117
[Sun Aug 18 22:47:53.863710 2019] [authz_core:error] [pid 2443] [client 45.126.22.162:41893] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org/drupal/comment/reply/117
[Sun Aug 18 23:11:04.257406 2019] [authz_core:error] [pid 2790] [client 45.126.22.162:59418] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org/drupal/comment/reply/917
...
2019-08-19 07:14:57
185.225.37.171 attackbotsspam
SASL Brute Force
2019-08-19 07:44:02
209.141.54.195 attackspambots
Trying ports that it shouldn't be.
2019-08-19 07:22:34
104.248.237.238 attack
Aug 19 01:03:15 meumeu sshd[11212]: Failed password for invalid user blog from 104.248.237.238 port 35872 ssh2
Aug 19 01:07:15 meumeu sshd[11767]: Failed password for invalid user server from 104.248.237.238 port 53448 ssh2
Aug 19 01:11:16 meumeu sshd[12346]: Failed password for invalid user shan from 104.248.237.238 port 42796 ssh2
...
2019-08-19 07:15:28
54.37.226.173 attack
F2B jail: sshd. Time: 2019-08-19 01:37:47, Reported by: VKReport
2019-08-19 07:46:26
140.143.25.160 attackbotsspam
$f2bV_matches
2019-08-19 07:14:39
92.118.37.86 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-08-19 07:52:49
91.106.186.208 attack
$f2bV_matches_ltvn
2019-08-19 07:35:57
193.56.28.119 attack
Too many connections or unauthorized access detected from Yankee banned ip
2019-08-19 07:28:11
200.98.136.120 attackbotsspam
firewall-block, port(s): 445/tcp
2019-08-19 07:47:31
165.22.195.196 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-19 07:41:37
31.182.57.162 attack
SSH invalid-user multiple login try
2019-08-19 07:28:26
36.156.24.78 attack
Aug 18 16:21:49 debian sshd[19818]: Unable to negotiate with 36.156.24.78 port 46166: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
Aug 18 19:32:23 debian sshd[28203]: Unable to negotiate with 36.156.24.78 port 57704: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
...
2019-08-19 07:38:42

Recently Reported IPs

113.173.23.29 50.94.172.253 196.236.146.248 38.156.87.203
23.129.64.191 201.117.178.115 163.23.232.217 193.142.250.251
91.33.100.219 38.42.195.147 112.134.86.232 92.46.113.114
58.32.32.185 158.191.88.226 104.19.157.40 213.178.45.23
196.75.253.183 81.46.221.148 46.5.225.161 44.32.180.173