Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ituiutaba

Region: Minas Gerais

Country: Brazil

Internet Service Provider: Algar Telecom

Hostname: unknown

Organization: ALGAR TELECOM S/A

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
201.48.148.26 attackbots
Unauthorized connection attempt detected from IP address 201.48.148.26 to port 445 [T]
2020-08-16 19:57:47
201.48.143.14 attack
Honeypot attack, port: 445, PTR: 201-048-143-014.static.ctbctelecom.com.br.
2020-07-25 23:39:44
201.48.147.177 attack
Unauthorized connection attempt detected from IP address 201.48.147.177 to port 1433 [T]
2020-07-22 02:04:58
201.48.142.167 attackbots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(03031155)
2020-03-03 20:46:50
201.48.142.8 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:18:32
201.48.148.26 attack
Unauthorized connection attempt detected from IP address 201.48.148.26 to port 445
2020-02-09 05:37:58
201.48.143.246 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 06-02-2020 13:45:17.
2020-02-06 23:32:49
201.48.142.117 attackbots
trying to access non-authorized port
2020-02-03 00:58:07
201.48.143.246 attackspambots
Honeypot attack, port: 445, PTR: 201-048-143-246.static.ctbctelecom.com.br.
2020-01-28 19:32:00
201.48.143.84 attack
Unauthorized connection attempt detected from IP address 201.48.143.84 to port 88 [J]
2020-01-19 17:11:59
201.48.147.177 attack
Honeypot attack, port: 445, PTR: 201-048-147-177.static.ctbctelecom.com.br.
2020-01-10 08:04:52
201.48.143.0 attackspam
Unauthorized connection attempt from IP address 201.48.143.0 on Port 445(SMB)
2019-12-06 08:45:12
201.48.142.63 attack
email spam
2019-11-08 22:37:03
201.48.142.161 attackbots
445/tcp
[2019-09-04]1pkt
2019-09-05 09:08:37
201.48.143.139 attackbotsspam
2 pkts, ports: TCP:445
2019-09-03 01:23:01
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.48.14.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49283
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.48.14.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu May 09 20:04:52 +08 2019
;; MSG SIZE  rcvd: 116

Host info
45.14.48.201.in-addr.arpa domain name pointer 201-048-014-045.static.ctbctelecom.com.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
45.14.48.201.in-addr.arpa	name = 201-048-014-045.static.ctbctelecom.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
128.199.204.164 attackbotsspam
(sshd) Failed SSH login from 128.199.204.164 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 09:50:13 optimus sshd[3841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
Sep 17 09:50:15 optimus sshd[3841]: Failed password for root from 128.199.204.164 port 59772 ssh2
Sep 17 09:54:38 optimus sshd[5470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
Sep 17 09:54:39 optimus sshd[5470]: Failed password for root from 128.199.204.164 port 41738 ssh2
Sep 17 10:03:37 optimus sshd[9386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164  user=root
2020-09-17 23:59:21
114.67.102.123 attackbotsspam
2020-09-17T15:20:07.240170amanda2.illicoweb.com sshd\[40194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.102.123  user=root
2020-09-17T15:20:08.692373amanda2.illicoweb.com sshd\[40194\]: Failed password for root from 114.67.102.123 port 52876 ssh2
2020-09-17T15:25:48.743917amanda2.illicoweb.com sshd\[40638\]: Invalid user student from 114.67.102.123 port 60470
2020-09-17T15:25:48.746553amanda2.illicoweb.com sshd\[40638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.102.123
2020-09-17T15:25:50.680108amanda2.illicoweb.com sshd\[40638\]: Failed password for invalid user student from 114.67.102.123 port 60470 ssh2
...
2020-09-17 23:59:52
77.121.92.243 attackspam
RDP Bruteforce
2020-09-17 23:44:21
128.199.212.15 attackbots
Sep 17 15:00:51 XXXXXX sshd[64478]: Invalid user qwe123 from 128.199.212.15 port 52600
2020-09-18 00:09:03
94.102.49.191 attack
Port scan: Attack repeated for 24 hours
2020-09-17 23:49:56
54.222.193.235 attackspam
RDP Bruteforce
2020-09-17 23:46:11
222.186.180.147 attack
Sep 17 17:59:45 vps647732 sshd[13835]: Failed password for root from 222.186.180.147 port 57456 ssh2
Sep 17 17:59:54 vps647732 sshd[13835]: Failed password for root from 222.186.180.147 port 57456 ssh2
...
2020-09-18 00:06:12
159.65.154.48 attack
Invalid user testing from 159.65.154.48 port 42662
2020-09-17 23:40:14
51.83.171.25 attackspambots
Multiple web server 503 error code (Service unavailable).
2020-09-17 23:47:01
191.252.153.168 attackbotsspam
RDP Bruteforce
2020-09-17 23:37:18
189.5.4.159 attack
RDP Bruteforce
2020-09-17 23:38:17
64.227.97.195 attack
400 BAD REQUEST
2020-09-17 23:50:52
3.10.137.57 attackbotsspam
SS5,DEF GET /wp-login.php
2020-09-17 23:58:07
74.62.86.11 attack
Auto Detect Rule!
proto TCP (SYN), 74.62.86.11:58916->gjan.info:3389, len 52
2020-09-17 23:45:14
37.193.123.110 attackbotsspam
 TCP (SYN) 37.193.123.110:21072 -> port 23, len 44
2020-09-17 23:33:39

Recently Reported IPs

81.25.184.47 27.176.219.134 50.169.12.83 88.186.16.65
188.136.105.201 93.195.195.16 103.29.117.18 103.83.191.43
122.247.206.112 83.246.47.194 128.21.65.23 169.48.157.72
190.126.241.147 188.174.46.72 8.156.136.235 221.120.215.18
192.159.201.230 129.187.237.35 200.51.42.34 104.54.235.66