Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lages

Region: Santa Catarina

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.193.121.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.193.121.164.		IN	A

;; AUTHORITY SECTION:
.			257	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:07:44 CST 2022
;; MSG SIZE  rcvd: 108
Host info
164.121.193.200.in-addr.arpa domain name pointer 200-193-121-164.jgsce200.dial.brasiltelecom.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.121.193.200.in-addr.arpa	name = 200-193-121-164.jgsce200.dial.brasiltelecom.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.158.8 attackspam
Jul 15 10:31:01 sshgateway sshd\[4813\]: Invalid user public from 45.55.158.8
Jul 15 10:31:01 sshgateway sshd\[4813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.158.8
Jul 15 10:31:02 sshgateway sshd\[4813\]: Failed password for invalid user public from 45.55.158.8 port 44008 ssh2
2019-07-15 21:45:00
130.211.96.77 attackbotsspam
Fail2Ban Ban Triggered
2019-07-15 21:51:17
113.118.159.169 attack
Jul 15 11:45:37 yesfletchmain sshd\[6908\]: Invalid user sistemas2 from 113.118.159.169 port 45712
Jul 15 11:45:37 yesfletchmain sshd\[6908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.118.159.169
Jul 15 11:45:38 yesfletchmain sshd\[6908\]: Failed password for invalid user sistemas2 from 113.118.159.169 port 45712 ssh2
Jul 15 11:51:17 yesfletchmain sshd\[7043\]: Invalid user admin from 113.118.159.169 port 40360
Jul 15 11:51:17 yesfletchmain sshd\[7043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.118.159.169
...
2019-07-15 21:33:09
37.120.135.221 attack
\[2019-07-15 05:15:14\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1396' - Wrong password
\[2019-07-15 05:15:14\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-15T05:15:14.879-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4324",SessionID="0x7f06f80214c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.120.135.221/51694",Challenge="156c99a6",ReceivedChallenge="156c99a6",ReceivedHash="bebe0474b2f62211773e245cb2c97b79"
\[2019-07-15 05:17:08\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '37.120.135.221:1361' - Wrong password
\[2019-07-15 05:17:08\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-15T05:17:08.890-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="9589",SessionID="0x7f06f803c558",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.1
2019-07-15 21:39:16
181.208.198.103 attackspambots
20 attempts against mh-ssh on gold.magehost.pro
2019-07-15 22:26:27
78.36.97.186 attackbots
POP
2019-07-15 22:10:59
111.125.67.125 attackspam
Automatic report - Port Scan Attack
2019-07-15 21:46:06
176.31.123.76 attack
SQL uri injection
2019-07-15 22:13:47
46.127.9.223 attackbots
15.07.2019 12:42:44 SSH access blocked by firewall
2019-07-15 22:04:43
191.102.91.210 attackbotsspam
Looking for resource vulnerabilities
2019-07-15 21:41:17
170.0.128.10 attack
Invalid user teamspeak3 from 170.0.128.10 port 38227
2019-07-15 21:57:05
165.22.133.68 attackspambots
SSH Bruteforce Attack
2019-07-15 22:04:05
14.187.36.45 attack
14.187.36.45 has been banned for [spam]
...
2019-07-15 21:31:29
146.185.25.176 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-15 21:32:13
185.12.109.102 attackbots
Automatic report - Banned IP Access
2019-07-15 22:10:15

Recently Reported IPs

200.194.1.177 200.194.11.234 200.194.13.138 200.194.14.2
200.194.14.106 200.193.157.6 200.194.10.37 200.194.16.173
200.194.0.211 200.194.18.187 200.194.2.31 200.194.20.1
200.194.22.232 200.194.21.226 200.194.28.169 200.194.24.22
200.194.28.206 200.194.27.2 200.194.30.78 200.194.30.115