Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.149.240.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.149.240.124.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:51:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
124.240.149.200.in-addr.arpa domain name pointer 200-149-240-124.ipc.telemar.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
124.240.149.200.in-addr.arpa	name = 200-149-240-124.ipc.telemar.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.236.103.140 attackspam
Automatic report - Port Scan Attack
2019-11-28 06:49:02
185.176.27.46 attackspam
11/27/2019-12:46:28.865303 185.176.27.46 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-28 06:55:51
103.89.91.156 attackspambots
3389BruteforceFW22
2019-11-28 06:34:56
176.31.250.171 attackspambots
Nov 27 23:31:59 dev0-dcde-rnet sshd[27837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.171
Nov 27 23:32:02 dev0-dcde-rnet sshd[27837]: Failed password for invalid user web from 176.31.250.171 port 36075 ssh2
Nov 27 23:38:06 dev0-dcde-rnet sshd[27856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.171
2019-11-28 06:56:05
117.6.163.179 attackbotsspam
Unauthorized connection attempt from IP address 117.6.163.179 on Port 445(SMB)
2019-11-28 06:46:28
177.11.44.209 attackspambots
Nov 27 15:40:10 uapps sshd[21164]: Address 177.11.44.209 maps to 177-11-44-209.virt.com.br, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Nov 27 15:40:10 uapps sshd[21164]: User r.r from 177.11.44.209 not allowed because not listed in AllowUsers
Nov 27 15:40:10 uapps sshd[21164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.11.44.209  user=r.r
Nov 27 15:40:12 uapps sshd[21164]: Failed password for invalid user r.r from 177.11.44.209 port 33364 ssh2
Nov 27 15:40:14 uapps sshd[21164]: Failed password for invalid user r.r from 177.11.44.209 port 33364 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.11.44.209
2019-11-28 06:38:17
181.196.177.20 attackspambots
Unauthorized connection attempt from IP address 181.196.177.20 on Port 445(SMB)
2019-11-28 06:33:33
181.65.164.179 attackspambots
Nov 27 12:55:54 hanapaa sshd\[26713\]: Invalid user guest0000 from 181.65.164.179
Nov 27 12:55:54 hanapaa sshd\[26713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179
Nov 27 12:55:56 hanapaa sshd\[26713\]: Failed password for invalid user guest0000 from 181.65.164.179 port 48886 ssh2
Nov 27 12:59:55 hanapaa sshd\[27056\]: Invalid user audrey from 181.65.164.179
Nov 27 12:59:55 hanapaa sshd\[27056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.65.164.179
2019-11-28 07:09:35
210.217.24.230 attackbotsspam
Nov 27 23:38:00 XXX sshd[25259]: Invalid user ofsaa from 210.217.24.230 port 59658
2019-11-28 07:03:38
95.85.26.23 attack
Nov 28 02:54:10 microserver sshd[63947]: Invalid user vision from 95.85.26.23 port 33846
Nov 28 02:54:10 microserver sshd[63947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.26.23
Nov 28 02:54:12 microserver sshd[63947]: Failed password for invalid user vision from 95.85.26.23 port 33846 ssh2
Nov 28 02:59:58 microserver sshd[64647]: Invalid user h from 95.85.26.23 port 41666
Nov 28 02:59:58 microserver sshd[64647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.26.23
2019-11-28 07:07:42
36.155.114.151 attackspam
Nov 27 22:51:44 cavern sshd[4883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.114.151
2019-11-28 06:51:40
27.47.154.207 attackspambots
Nov 27 22:54:11 XXX sshd[27977]: Invalid user castis from 27.47.154.207 port 2543
2019-11-28 07:06:37
178.54.207.101 attackspam
UTC: 2019-11-26 port: 22/tcp
2019-11-28 07:00:06
220.132.28.238 attack
Unauthorized connection attempt from IP address 220.132.28.238 on Port 445(SMB)
2019-11-28 06:50:24
222.186.190.2 attackspam
2019-11-27T23:04:55.471309abusebot-6.cloudsearch.cf sshd\[5372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2019-11-28 07:08:30

Recently Reported IPs

86.5.114.140 38.25.178.225 210.171.47.204 56.146.92.74
50.134.89.217 36.244.235.212 170.142.228.26 211.39.145.67
198.238.18.248 118.102.35.200 72.191.203.189 171.144.81.71
18.115.224.132 101.138.214.191 14.198.252.74 68.58.166.125
26.159.108.89 8.114.233.140 216.129.75.243 22.139.218.191