Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Limeira

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.12.7.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39448
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.12.7.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121900 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 19 20:44:23 CST 2024
;; MSG SIZE  rcvd: 104
Host info
Host 48.7.12.200.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.7.12.200.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.78.109.155 attack
Wordpress hacking
2019-10-18 02:57:51
109.70.100.20 attack
GET (not exists) posting.php-spambot
2019-10-18 02:42:55
51.15.117.50 attackspam
Automatic report - XMLRPC Attack
2019-10-18 02:48:14
79.172.193.32 attackspambots
GET (not exists) posting.php-spambot
2019-10-18 02:46:57
217.115.10.131 attackbots
Automatic report - XMLRPC Attack
2019-10-18 02:29:05
209.95.51.11 attack
Oct 17 19:28:50 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2Oct 17 19:28:52 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2Oct 17 19:28:55 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2Oct 17 19:28:58 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2Oct 17 19:29:00 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2Oct 17 19:29:03 rotator sshd\[17298\]: Failed password for root from 209.95.51.11 port 54696 ssh2
...
2019-10-18 02:29:29
199.249.230.108 attackspam
GET (not exists) posting.php-spambot
2019-10-18 02:30:46
185.220.101.46 attackbots
GET (not exists) posting.php-spambot
2019-10-18 02:35:44
51.15.43.205 attackspambots
xmlrpc attack
2019-10-18 02:48:37
149.56.192.232 attackspambots
Wordpress hacking
2019-10-18 02:57:08
109.234.38.61 attack
0,14-01/02 [bc01/m70] PostRequest-Spammer scoring: Durban01
2019-10-18 02:41:52
193.112.173.96 attackbotsspam
Oct 17 14:29:56 vps01 sshd[21357]: Failed password for root from 193.112.173.96 port 59496 ssh2
2019-10-18 02:22:50
46.101.44.220 attack
2019-10-17T17:34:26.762105lon01.zurich-datacenter.net sshd\[4453\]: Invalid user verner from 46.101.44.220 port 59086
2019-10-17T17:34:26.769466lon01.zurich-datacenter.net sshd\[4453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.44.220
2019-10-17T17:34:28.275806lon01.zurich-datacenter.net sshd\[4453\]: Failed password for invalid user verner from 46.101.44.220 port 59086 ssh2
2019-10-17T17:38:53.057974lon01.zurich-datacenter.net sshd\[4531\]: Invalid user len123 from 46.101.44.220 port 42640
2019-10-17T17:38:53.065712lon01.zurich-datacenter.net sshd\[4531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.44.220
...
2019-10-18 02:24:04
103.65.195.163 attack
$f2bV_matches
2019-10-18 02:19:53
81.17.27.140 attackbots
GET (not exists) posting.php-spambot
2019-10-18 02:45:42

Recently Reported IPs

109.212.51.18 172.65.180.119 187.124.39.42 177.114.155.46
64.128.92.32 144.201.132.209 57.249.79.22 202.86.232.0
233.219.71.189 94.95.247.148 164.60.0.176 107.114.114.204
139.160.109.101 61.127.227.254 9.87.144.157 93.31.100.107
60.236.175.106 115.131.184.235 77.79.248.120 249.93.28.59