Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santo André

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: TELEFÔNICA BRASIL S.A

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.13.41.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49084
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.13.41.19.			IN	A

;; AUTHORITY SECTION:
.			1950	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon May 13 03:06:43 CST 2019
;; MSG SIZE  rcvd: 116

Host info
19.41.13.201.in-addr.arpa domain name pointer 201-13-41-19.dsl.telesp.net.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
19.41.13.201.in-addr.arpa	name = 201-13-41-19.dsl.telesp.net.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.234.33.229 attack
Invalid user michael from 49.234.33.229 port 53550
2020-02-27 07:01:49
14.173.201.180 attackbotsspam
Automatic report - Port Scan Attack
2020-02-27 07:17:43
223.223.205.114 attackbots
firewall-block, port(s): 1433/tcp
2020-02-27 06:43:13
101.71.2.165 attackbotsspam
Feb 26 22:38:58 Ubuntu-1404-trusty-64-minimal sshd\[8848\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.165  user=postfix
Feb 26 22:38:59 Ubuntu-1404-trusty-64-minimal sshd\[8848\]: Failed password for postfix from 101.71.2.165 port 13227 ssh2
Feb 26 22:50:07 Ubuntu-1404-trusty-64-minimal sshd\[15567\]: Invalid user ns2c from 101.71.2.165
Feb 26 22:50:07 Ubuntu-1404-trusty-64-minimal sshd\[15567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.71.2.165
Feb 26 22:50:09 Ubuntu-1404-trusty-64-minimal sshd\[15567\]: Failed password for invalid user ns2c from 101.71.2.165 port 13234 ssh2
2020-02-27 06:49:48
110.45.244.79 attackspam
Feb 26 23:51:15 jane sshd[27636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.244.79 
Feb 26 23:51:17 jane sshd[27636]: Failed password for invalid user ll from 110.45.244.79 port 59134 ssh2
...
2020-02-27 06:55:28
165.16.1.18 attackbots
Feb 26 22:50:12 grey postfix/smtpd\[24854\]: NOQUEUE: reject: RCPT from unknown\[165.16.1.18\]: 554 5.7.1 Service unavailable\; Client host \[165.16.1.18\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[165.16.1.18\]\; from=\ to=\ proto=SMTP helo=\
...
2020-02-27 06:46:39
34.213.87.129 attackbots
02/27/2020-00:09:46.813230 34.213.87.129 Protocol: 6 SURICATA TLS invalid record/traffic
2020-02-27 07:09:57
139.59.43.159 attack
Invalid user vnc from 139.59.43.159 port 49846
2020-02-27 07:19:09
114.32.186.34 attackbots
scan z
2020-02-27 06:41:15
162.243.132.165 attackbotsspam
Automatic report - Port Scan Attack
2020-02-27 07:20:13
66.240.236.119 attackbotsspam
66.240.236.119 was recorded 8 times by 6 hosts attempting to connect to the following ports: 6668,6664,43,4242,69,11300,4782,2222. Incident counter (4h, 24h, all-time): 8, 29, 1108
2020-02-27 06:53:38
153.126.141.19 attackspambots
kp-sea2-01 recorded 2 login violations from 153.126.141.19 and was blocked at 2020-02-26 21:49:32. 153.126.141.19 has been blocked on 5 previous occasions. 153.126.141.19's first attempt was recorded at 2020-02-26 01:09:21
2020-02-27 07:14:59
87.120.254.98 attackspam
abuseConfidenceScore blocked for 12h
2020-02-27 07:01:08
106.13.111.19 attackspambots
Feb 26 23:57:05 sd-53420 sshd\[5466\]: Invalid user impala from 106.13.111.19
Feb 26 23:57:05 sd-53420 sshd\[5466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.111.19
Feb 26 23:57:08 sd-53420 sshd\[5466\]: Failed password for invalid user impala from 106.13.111.19 port 39114 ssh2
Feb 27 00:06:49 sd-53420 sshd\[6340\]: User root from 106.13.111.19 not allowed because none of user's groups are listed in AllowGroups
Feb 27 00:06:49 sd-53420 sshd\[6340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.111.19  user=root
...
2020-02-27 07:13:12
27.72.126.108 attackspambots
1582753725 - 02/26/2020 22:48:45 Host: 27.72.126.108/27.72.126.108 Port: 445 TCP Blocked
2020-02-27 07:24:29

Recently Reported IPs

5.108.148.77 66.38.28.215 218.5.81.183 185.159.128.94
198.108.66.180 39.89.168.119 109.201.152.233 174.109.55.90
69.79.249.97 186.170.28.184 149.99.224.232 185.39.113.101
113.203.240.82 156.33.94.42 89.163.131.119 98.88.199.26
125.79.239.202 179.83.224.47 172.178.181.100 2.189.123.236