Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: São Paulo

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.42.196.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54403
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.42.196.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025042802 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 29 13:31:00 CST 2025
;; MSG SIZE  rcvd: 106
Host info
86.196.42.201.in-addr.arpa domain name pointer 201-42-196-86.dsl.telesp.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
86.196.42.201.in-addr.arpa	name = 201-42-196-86.dsl.telesp.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.78.7 attack
SSH Brute Force
2020-05-17 07:47:51
68.48.240.245 attackbots
Invalid user teste from 68.48.240.245 port 38786
2020-05-17 07:49:47
185.128.43.46 attackbots
15 attempts against mh_ha-mag-login-ban on crop
2020-05-17 07:16:24
36.111.182.52 attackspambots
May 16 23:42:00 h2646465 sshd[16955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.52  user=root
May 16 23:42:02 h2646465 sshd[16955]: Failed password for root from 36.111.182.52 port 44978 ssh2
May 17 00:00:53 h2646465 sshd[19966]: Invalid user hduser from 36.111.182.52
May 17 00:00:53 h2646465 sshd[19966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.52
May 17 00:00:53 h2646465 sshd[19966]: Invalid user hduser from 36.111.182.52
May 17 00:00:55 h2646465 sshd[19966]: Failed password for invalid user hduser from 36.111.182.52 port 35574 ssh2
May 17 00:02:54 h2646465 sshd[20046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.52  user=root
May 17 00:02:56 h2646465 sshd[20046]: Failed password for root from 36.111.182.52 port 33618 ssh2
May 17 00:05:01 h2646465 sshd[20131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
2020-05-17 07:37:27
62.60.128.89 attackbots
Invalid user demon123 from 62.60.128.89 port 43666
2020-05-17 07:50:06
37.49.226.248 attack
2020-05-16 17:29:59.561868-0500  localhost sshd[35342]: Failed password for root from 37.49.226.248 port 43236 ssh2
2020-05-17 07:11:57
111.229.129.100 attack
May 17 00:13:36 mail sshd[11883]: Failed password for root from 111.229.129.100 port 57560 ssh2
...
2020-05-17 07:47:17
61.133.232.254 attack
Invalid user dip from 61.133.232.254 port 60166
2020-05-17 07:50:35
51.91.77.104 attack
Invalid user penis from 51.91.77.104 port 60140
2020-05-17 07:10:54
218.92.0.158 attackspambots
May 17 00:58:00 ns381471 sshd[32339]: Failed password for root from 218.92.0.158 port 52532 ssh2
May 17 00:58:13 ns381471 sshd[32339]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 52532 ssh2 [preauth]
2020-05-17 07:05:22
193.228.109.189 attackbotsspam
Invalid user telcel3 from 193.228.109.189 port 46550
2020-05-17 07:24:58
151.69.187.91 attackspam
Port scan on 1 port(s): 3389
2020-05-17 07:12:55
51.141.84.21 attack
SSH Invalid Login
2020-05-17 07:22:06
129.191.25.253 attackspambots
SSH Brute Force
2020-05-17 07:28:05
123.206.7.96 attackspambots
2020-05-17T01:04:04.859169rocketchat.forhosting.nl sshd[27870]: Failed password for root from 123.206.7.96 port 35173 ssh2
2020-05-17T01:08:41.481711rocketchat.forhosting.nl sshd[27955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.7.96  user=root
2020-05-17T01:08:43.244234rocketchat.forhosting.nl sshd[27955]: Failed password for root from 123.206.7.96 port 39082 ssh2
...
2020-05-17 07:45:05

Recently Reported IPs

199.45.155.88 154.23.164.29 36.34.12.153 36.32.48.80
103.38.82.87 45.207.212.52 103.38.82.160 151.118.4.148
89.42.93.56 194.104.17.126 96.214.8.28 218.92.0.218
134.77.59.128 175.29.199.187 240.167.119.86 59.73.239.68
58.34.184.194 17.96.236.92 20.80.108.3 196.251.86.237