Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.164.117.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.164.117.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:51:12 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.117.164.200.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 200.164.117.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.218.32.14 attack
445/tcp
[2019-10-26]1pkt
2019-10-26 16:49:19
187.32.178.33 attackspam
Invalid user lin from 187.32.178.33 port 55534
2019-10-26 16:23:52
27.72.45.221 attackspambots
445/tcp
[2019-10-26]1pkt
2019-10-26 16:47:02
61.52.73.169 attack
10/26/2019-03:38:47.241486 61.52.73.169 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-26 16:37:14
106.13.30.80 attack
Oct 21 12:41:38 penfold sshd[18648]: Invalid user Adminixxxr from 106.13.30.80 port 40146
Oct 21 12:41:38 penfold sshd[18648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.30.80 
Oct 21 12:41:40 penfold sshd[18648]: Failed password for invalid user Adminixxxr from 106.13.30.80 port 40146 ssh2
Oct 21 12:41:42 penfold sshd[18648]: Received disconnect from 106.13.30.80 port 40146:11: Bye Bye [preauth]
Oct 21 12:41:42 penfold sshd[18648]: Disconnected from 106.13.30.80 port 40146 [preauth]
Oct 21 13:06:44 penfold sshd[19601]: Invalid user dev from 106.13.30.80 port 54170
Oct 21 13:06:44 penfold sshd[19601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.30.80 
Oct 21 13:06:46 penfold sshd[19601]: Failed password for invalid user dev from 106.13.30.80 port 54170 ssh2
Oct 21 13:06:47 penfold sshd[19601]: Received disconnect from 106.13.30.80 port 54170:11: Bye Bye [preauth]
Oct 2........
-------------------------------
2019-10-26 16:24:20
104.233.226.62 attack
Oct 26 09:44:22 nextcloud sshd\[17496\]: Invalid user ftpuser from 104.233.226.62
Oct 26 09:44:22 nextcloud sshd\[17496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.233.226.62
Oct 26 09:44:23 nextcloud sshd\[17496\]: Failed password for invalid user ftpuser from 104.233.226.62 port 43466 ssh2
...
2019-10-26 16:37:41
213.148.194.75 attackspam
5555/tcp
[2019-10-26]1pkt
2019-10-26 16:44:54
116.196.80.104 attackspam
2019-10-26T03:47:44.619880abusebot-4.cloudsearch.cf sshd\[9836\]: Invalid user ack from 116.196.80.104 port 34634
2019-10-26 16:53:24
157.7.52.245 attackspambots
Oct 26 10:41:24 ncomp sshd[13474]: Invalid user www from 157.7.52.245
Oct 26 10:41:24 ncomp sshd[13474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.52.245
Oct 26 10:41:24 ncomp sshd[13474]: Invalid user www from 157.7.52.245
Oct 26 10:41:26 ncomp sshd[13474]: Failed password for invalid user www from 157.7.52.245 port 42688 ssh2
2019-10-26 16:42:23
157.56.177.77 attackbots
2019-10-22T14:02:17.451613ldap.arvenenaske.de sshd[12863]: Connection from 157.56.177.77 port 59916 on 5.199.128.55 port 22
2019-10-22T14:02:20.100036ldap.arvenenaske.de sshd[12863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.56.177.77  user=r.r
2019-10-22T14:02:21.625040ldap.arvenenaske.de sshd[12863]: Failed password for r.r from 157.56.177.77 port 59916 ssh2
2019-10-22T14:02:24.576351ldap.arvenenaske.de sshd[12863]: Failed password for r.r from 157.56.177.77 port 59916 ssh2
2019-10-22T14:02:17.451613ldap.arvenenaske.de sshd[12863]: Connection from 157.56.177.77 port 59916 on 5.199.128.55 port 22
2019-10-22T14:02:20.100036ldap.arvenenaske.de sshd[12863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.56.177.77  user=r.r
2019-10-22T14:02:21.625040ldap.arvenenaske.de sshd[12863]: Failed password for r.r from 157.56.177.77 port 59916 ssh2
2019-10-22T14:02:24.576351ldap.arvenenask........
------------------------------
2019-10-26 16:56:39
167.114.55.84 attackspambots
Oct 26 10:19:31 lnxweb62 sshd[28612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84
2019-10-26 16:36:40
77.247.110.245 attackbotsspam
\[2019-10-26 05:48:08\] SECURITY\[1882\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-26T05:48:08.443+0200",Severity="Error",Service="SIP",EventVersion="2",AccountID="202",SessionID="0x7fde910f8fa8",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/77.247.110.245/6093",Challenge="5f6dacd7",ReceivedChallenge="5f6dacd7",ReceivedHash="d8bf93b9666bb709fcd342da4d9d0f9a"
\[2019-10-26 05:48:08\] SECURITY\[1882\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-26T05:48:08.768+0200",Severity="Error",Service="SIP",EventVersion="2",AccountID="202",SessionID="0x7fde91351f98",LocalAddress="IPV4/UDP/204.8.216.89/5060",RemoteAddress="IPV4/UDP/77.247.110.245/6093",Challenge="23187c89",ReceivedChallenge="23187c89",ReceivedHash="11ff76b04a77fb09c01da8bc70f5d8b7"
\[2019-10-26 05:48:08\] SECURITY\[1882\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-26T05:48:08.852+0200",Severity="Error",Service="SIP",EventVersion="2",Acco
...
2019-10-26 16:34:21
52.192.157.100 attackspambots
slow and persistent scanner
2019-10-26 16:48:22
137.74.25.247 attack
Oct 25 22:18:57 auw2 sshd\[20786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247  user=root
Oct 25 22:18:59 auw2 sshd\[20786\]: Failed password for root from 137.74.25.247 port 42530 ssh2
Oct 25 22:22:49 auw2 sshd\[21077\]: Invalid user receivedmail from 137.74.25.247
Oct 25 22:22:49 auw2 sshd\[21077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.25.247
Oct 25 22:22:51 auw2 sshd\[21077\]: Failed password for invalid user receivedmail from 137.74.25.247 port 34094 ssh2
2019-10-26 16:27:56
89.254.238.252 attack
Chat Spam
2019-10-26 16:25:12

Recently Reported IPs

133.45.27.164 209.65.205.244 40.47.119.201 124.144.96.53
95.117.61.182 53.48.50.155 202.27.163.175 28.210.133.130
45.156.90.23 169.163.107.240 109.228.248.136 189.139.40.219
73.212.147.210 200.184.175.63 151.119.47.109 235.64.152.18
215.119.164.76 65.21.97.130 143.182.132.154 217.213.28.46