Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
201.140.212.85 attackspam
Unauthorized connection attempt detected from IP address 201.140.212.85 to port 80
2020-04-13 00:15:54
201.140.212.34 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 13:09:49,746 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.140.212.34)
2019-07-04 03:52:25
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.140.212.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27110
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.140.212.49.			IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:50:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'49.212.140.201.in-addr.arpa domain name pointer s50.arionservices.com.br.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.212.140.201.in-addr.arpa	name = s50.arionservices.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.196.17.50 attackbots
Unauthorized connection attempt detected from IP address 201.196.17.50 to port 4567 [J]
2020-01-05 07:48:06
189.164.157.161 attack
Unauthorized connection attempt from IP address 189.164.157.161 on Port 445(SMB)
2020-01-05 07:52:57
185.176.33.140 attackspambots
Unauthorized connection attempt detected from IP address 185.176.33.140 to port 9090
2020-01-05 07:54:55
88.5.56.101 attack
Unauthorized connection attempt detected from IP address 88.5.56.101 to port 81
2020-01-05 08:02:52
112.162.42.46 attack
Unauthorized connection attempt detected from IP address 112.162.42.46 to port 5555
2020-01-05 08:00:13
79.52.197.201 attack
Unauthorized connection attempt detected from IP address 79.52.197.201 to port 23
2020-01-05 07:39:18
62.248.60.252 attackbots
Unauthorized connection attempt detected from IP address 62.248.60.252 to port 445
2020-01-05 07:41:41
89.102.21.230 attackbotsspam
Unauthorized connection attempt detected from IP address 89.102.21.230 to port 80 [J]
2020-01-05 07:37:40
37.133.49.92 attackbots
Unauthorized connection attempt detected from IP address 37.133.49.92 to port 5555 [J]
2020-01-05 07:44:58
197.26.162.112 attack
Unauthorized connection attempt detected from IP address 197.26.162.112 to port 5555 [J]
2020-01-05 07:50:14
95.79.117.172 attackspam
Unauthorized connection attempt detected from IP address 95.79.117.172 to port 8080
2020-01-05 07:34:36
88.224.181.103 attack
Unauthorized connection attempt detected from IP address 88.224.181.103 to port 23
2020-01-05 07:38:21
173.180.63.57 attack
Unauthorized connection attempt detected from IP address 173.180.63.57 to port 5555
2020-01-05 07:58:03
85.93.20.83 attackbotsspam
200104 16:54:34 [Warning] Access denied for user 'root'@'85.93.20.83' (using password: YES)
200104 16:54:39 [Warning] Access denied for user 'root'@'85.93.20.83' (using password: YES)
200104 16:54:43 [Warning] Access denied for user 'root'@'85.93.20.83' (using password: YES)
...
2020-01-05 08:04:01
201.240.245.84 attackbots
Unauthorized connection attempt detected from IP address 201.240.245.84 to port 5358
2020-01-05 07:47:51

Recently Reported IPs

201.140.7.176 201.140.230.104 201.140.7.188 201.140.240.135
201.140.21.112 201.140.246.11 201.140.7.187 201.140.8.109
201.140.8.188 201.140.8.190 201.140.8.27 201.140.8.75
201.140.9.109 201.141.117.40 201.140.99.157 201.141.173.167
201.141.123.70 201.141.21.163 201.141.211.41 201.141.22.76