Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.149.72.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.149.72.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 18:42:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
106.72.149.200.in-addr.arpa domain name pointer 200-149-72-106.ultrabandalargafibra.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.72.149.200.in-addr.arpa	name = 200-149-72-106.ultrabandalargafibra.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
86.98.75.19 attackbots
445/tcp 445/tcp
[2019-06-26/28]2pkt
2019-06-29 13:08:49
66.79.178.214 attackspambots
Unauthorised access (Jun 29) SRC=66.79.178.214 LEN=40 PREC=0x20 TTL=242 ID=50124 TCP DPT=445 WINDOW=1024 SYN
2019-06-29 12:31:25
188.165.0.128 attack
Automatic report - Web App Attack
2019-06-29 12:52:31
185.193.125.42 attackbotsspam
Jun 29 04:15:34 v22018076622670303 sshd\[26842\]: Invalid user 888888 from 185.193.125.42 port 41966
Jun 29 04:15:34 v22018076622670303 sshd\[26842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.193.125.42
Jun 29 04:15:37 v22018076622670303 sshd\[26842\]: Failed password for invalid user 888888 from 185.193.125.42 port 41966 ssh2
...
2019-06-29 12:55:35
178.76.69.132 attackbotsspam
proto=tcp  .  spt=49299  .  dpt=25  .     (listed on Blocklist de  Jun 28)     (10)
2019-06-29 12:36:05
103.106.211.67 attack
Jun 29 04:18:21 mail sshd\[17685\]: Invalid user neng from 103.106.211.67
Jun 29 04:18:21 mail sshd\[17685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.106.211.67
Jun 29 04:18:23 mail sshd\[17685\]: Failed password for invalid user neng from 103.106.211.67 port 64638 ssh2
...
2019-06-29 12:36:31
40.127.106.50 attackspam
$f2bV_matches
2019-06-29 12:27:39
188.131.170.119 attackspam
2019-06-29T01:14:46.1529661240 sshd\[17085\]: Invalid user zabbix from 188.131.170.119 port 49670
2019-06-29T01:14:46.1593891240 sshd\[17085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.170.119
2019-06-29T01:14:48.1906881240 sshd\[17085\]: Failed password for invalid user zabbix from 188.131.170.119 port 49670 ssh2
...
2019-06-29 12:24:32
177.19.185.235 attack
Brute force attempt
2019-06-29 12:28:07
13.75.94.69 attack
[portscan] Port scan
2019-06-29 12:28:39
194.213.43.84 attack
proto=tcp  .  spt=33451  .  dpt=25  .     (listed on Blocklist de  Jun 28)     (15)
2019-06-29 12:30:39
223.171.42.175 attack
SSH Bruteforce
2019-06-29 12:57:07
198.108.67.101 attackbotsspam
firewall-block, port(s): 7003/tcp
2019-06-29 12:51:53
165.227.69.188 attack
Brute SSH
2019-06-29 12:43:18
178.148.130.192 attackspambots
LGS,WP GET /wp-login.php
2019-06-29 12:46:55

Recently Reported IPs

62.192.25.202 36.53.38.230 50.47.28.33 146.243.183.57
5.99.183.117 58.48.167.138 32.108.12.155 127.114.162.237
216.236.196.93 42.70.179.59 77.30.172.203 174.167.9.223
143.48.155.140 117.174.214.53 184.254.50.248 120.10.59.196
138.232.232.54 225.91.231.89 12.139.130.109 247.192.165.159