Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Campinas

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.148.230.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.148.230.70.			IN	A

;; AUTHORITY SECTION:
.			236	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020072901 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 30 08:35:10 CST 2020
;; MSG SIZE  rcvd: 118
Host info
70.230.148.200.in-addr.arpa domain name pointer 200-148-230-70.customer.tdatabrasil.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.230.148.200.in-addr.arpa	name = 200-148-230-70.customer.tdatabrasil.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.172.36.232 attack
Invalid user external from 167.172.36.232 port 46596
2020-10-03 20:44:49
188.131.131.59 attackbots
Oct  3 10:11:52 ncomp sshd[17656]: Invalid user postgres from 188.131.131.59 port 40286
Oct  3 10:11:52 ncomp sshd[17656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.131.59
Oct  3 10:11:52 ncomp sshd[17656]: Invalid user postgres from 188.131.131.59 port 40286
Oct  3 10:11:54 ncomp sshd[17656]: Failed password for invalid user postgres from 188.131.131.59 port 40286 ssh2
2020-10-03 20:43:29
190.163.7.156 attack
C1,WP GET /wp-login.php
2020-10-03 20:35:20
122.155.223.59 attackspambots
sshguard
2020-10-03 20:40:46
160.124.103.55 attack
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-03 20:38:18
14.200.208.244 attackbotsspam
Invalid user test from 14.200.208.244 port 33472
2020-10-03 21:03:50
61.133.232.253 attack
2020-10-03T06:19:44.240665morrigan.ad5gb.com sshd[536936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.253  user=git
2020-10-03T06:19:46.211805morrigan.ad5gb.com sshd[536936]: Failed password for git from 61.133.232.253 port 37394 ssh2
2020-10-03 20:47:20
103.90.228.16 attackspam
20 attempts against mh_ha-misbehave-ban on oak
2020-10-03 21:02:51
154.209.253.241 attackbotsspam
Oct  3 14:49:55 serwer sshd\[25452\]: Invalid user ravi from 154.209.253.241 port 40898
Oct  3 14:49:55 serwer sshd\[25452\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.253.241
Oct  3 14:49:57 serwer sshd\[25452\]: Failed password for invalid user ravi from 154.209.253.241 port 40898 ssh2
...
2020-10-03 21:05:22
193.112.191.228 attack
Automatic Fail2ban report - Trying login SSH
2020-10-03 21:07:39
176.109.184.235 attack
Automated report (2020-10-03T00:30:09+02:00). Spambot detected.
2020-10-03 20:44:20
45.148.121.92 attackspam
UDP port : 5060
2020-10-03 20:46:55
72.180.73.137 attackspambots
Oct  3 08:52:22 mx sshd[5688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.180.73.137
Oct  3 08:52:24 mx sshd[5688]: Failed password for invalid user wan from 72.180.73.137 port 47658 ssh2
2020-10-03 21:10:13
211.220.27.191 attackbotsspam
Invalid user jack from 211.220.27.191 port 37902
2020-10-03 20:49:17
159.65.154.48 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 21:55:53

Recently Reported IPs

177.17.119.75 122.110.45.230 110.102.169.183 187.189.52.121
24.197.22.130 222.236.52.153 212.8.88.79 216.105.91.252
162.190.157.206 197.180.233.109 213.147.83.164 121.30.129.22
125.142.197.12 178.185.204.51 221.103.157.84 111.149.157.36
37.166.87.231 109.247.147.229 14.208.159.242 41.35.60.132