Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.221.8.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26359
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.221.8.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 08:46:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
145.8.221.200.in-addr.arpa domain name pointer hakan5.uol.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.8.221.200.in-addr.arpa	name = hakan5.uol.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
171.117.204.173 attack
The IP has triggered Cloudflare WAF. CF-Ray: 53d320e00b24ed5f | WAF_Rule_ID: 3b40188685924a32bf11d40edea05a27 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: doku.skk.moe | User-Agent: Mozilla/5.081397758 Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0) | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-11-30 07:11:49
114.29.236.196 attackspambots
1433/tcp 445/tcp
[2019-10-28/11-29]2pkt
2019-11-30 06:56:27
103.58.248.1 attackbotsspam
web Attack on Website
2019-11-30 07:04:32
192.95.14.196 bots
Excessive page not found.  Auto locked out.
2019-11-30 07:15:29
182.61.58.131 attack
Invalid user server from 182.61.58.131 port 53076
2019-11-30 07:20:28
209.17.97.26 attackbotsspam
209.17.97.26 was recorded 7 times by 5 hosts attempting to connect to the following ports: 990,5916,37777,8081. Incident counter (4h, 24h, all-time): 7, 44, 900
2019-11-30 07:09:24
203.110.179.26 attackbots
Invalid user news from 203.110.179.26 port 51276
2019-11-30 07:09:42
106.52.106.6 attackspambots
SSH login attempts with user root.
2019-11-30 06:48:22
106.12.188.252 attackspambots
Nov 29 23:28:20 icinga sshd[23314]: Failed password for root from 106.12.188.252 port 46034 ssh2
...
2019-11-30 07:20:59
202.98.213.218 attack
$f2bV_matches
2019-11-30 06:54:26
103.62.232.13 attackbots
445/tcp 1433/tcp...
[2019-10-19/11-29]6pkt,2pt.(tcp)
2019-11-30 07:13:45
80.173.177.132 attack
Invalid user behrman from 80.173.177.132 port 60186
2019-11-30 06:49:52
36.110.199.9 attack
The IP has triggered Cloudflare WAF. CF-Ray: 53d0dc35eacdd35e | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-11-30 07:15:03
104.236.176.1 attackspambots
SSH login attempts with user root.
2019-11-30 06:59:02
188.131.190.3 attackspam
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3
Nov 30 00:56:47 itv-usvr-01 sshd[17244]: Invalid user tanya from 188.131.190.3
Nov 30 00:56:50 itv-usvr-01 sshd[17244]: Failed password for invalid user tanya from 188.131.190.3 port 35496 ssh2
Nov 30 00:59:53 itv-usvr-01 sshd[17342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.190.3  user=root
Nov 30 00:59:55 itv-usvr-01 sshd[17342]: Failed password for root from 188.131.190.3 port 36242 ssh2
2019-11-30 07:16:39

Recently Reported IPs

168.136.40.61 196.139.218.175 114.98.165.10 114.86.206.118
248.14.201.38 228.241.4.46 108.232.107.23 174.223.8.53
188.68.64.137 75.160.146.115 64.154.208.154 172.222.254.27
216.70.49.159 177.167.5.198 132.77.34.81 124.57.34.120
51.176.96.19 249.92.4.127 162.225.84.53 172.180.177.112