Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Algar Telecom S/A

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
$f2bV_matches
2020-10-01 07:59:39
attackspam
Invalid user a from 201.48.192.60 port 53490
2020-10-01 00:31:30
attack
2020-09-26T17:14:04.239966shield sshd\[8187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-09-26T17:14:06.668775shield sshd\[8187\]: Failed password for root from 201.48.192.60 port 40629 ssh2
2020-09-26T17:18:29.235806shield sshd\[9096\]: Invalid user testuser from 201.48.192.60 port 44655
2020-09-26T17:18:29.248021shield sshd\[9096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
2020-09-26T17:18:31.054699shield sshd\[9096\]: Failed password for invalid user testuser from 201.48.192.60 port 44655 ssh2
2020-09-27 01:37:26
attackspambots
SSH login attempts.
2020-09-26 17:30:20
attack
Invalid user applmgr from 201.48.192.60 port 57240
2020-09-18 01:56:46
attackspam
2020-09-17T09:42:49.287193vps773228.ovh.net sshd[28838]: Failed password for root from 201.48.192.60 port 35650 ssh2
2020-09-17T09:47:37.138445vps773228.ovh.net sshd[28904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-09-17T09:47:38.804112vps773228.ovh.net sshd[28904]: Failed password for root from 201.48.192.60 port 41822 ssh2
2020-09-17T09:52:29.508858vps773228.ovh.net sshd[28965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-09-17T09:52:31.927161vps773228.ovh.net sshd[28965]: Failed password for root from 201.48.192.60 port 47987 ssh2
...
2020-09-17 17:58:40
attackbotsspam
Invalid user applmgr from 201.48.192.60 port 57240
2020-09-17 09:11:04
attack
2020-08-28T04:38:46.578589hostname sshd[31152]: Failed password for invalid user dipak from 201.48.192.60 port 45166 ssh2
2020-08-28T04:44:09.289901hostname sshd[796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-08-28T04:44:10.926587hostname sshd[796]: Failed password for root from 201.48.192.60 port 37594 ssh2
...
2020-08-28 06:35:06
attackspam
Aug 27 16:33:11 ns381471 sshd[28046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
Aug 27 16:33:12 ns381471 sshd[28046]: Failed password for invalid user markus from 201.48.192.60 port 33744 ssh2
2020-08-27 23:25:25
attackbots
Aug 26 12:45:01 hosting sshd[4048]: Invalid user usher from 201.48.192.60 port 54800
Aug 26 12:45:01 hosting sshd[4048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
Aug 26 12:45:01 hosting sshd[4048]: Invalid user usher from 201.48.192.60 port 54800
Aug 26 12:45:03 hosting sshd[4048]: Failed password for invalid user usher from 201.48.192.60 port 54800 ssh2
Aug 26 12:50:28 hosting sshd[4883]: Invalid user b from 201.48.192.60 port 47744
...
2020-08-26 18:00:30
attackspam
prod6
...
2020-08-03 19:02:53
attackspam
2020-08-02T13:23:42.128649n23.at sshd[3834389]: Failed password for root from 201.48.192.60 port 46665 ssh2
2020-08-02T13:27:37.108858n23.at sshd[3837474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-08-02T13:27:38.672354n23.at sshd[3837474]: Failed password for root from 201.48.192.60 port 46642 ssh2
...
2020-08-02 19:43:44
attack
Fail2Ban Ban Triggered
2020-07-14 18:33:42
attackspambots
Invalid user admin from 201.48.192.60 port 56863
2020-07-11 19:34:16
attackspambots
5x Failed Password
2020-07-05 18:19:57
attackspam
Jul  3 08:59:38 php1 sshd\[32210\]: Invalid user jess from 201.48.192.60
Jul  3 08:59:38 php1 sshd\[32210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
Jul  3 08:59:40 php1 sshd\[32210\]: Failed password for invalid user jess from 201.48.192.60 port 57894 ssh2
Jul  3 09:02:43 php1 sshd\[32480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
Jul  3 09:02:44 php1 sshd\[32480\]: Failed password for root from 201.48.192.60 port 44644 ssh2
2020-07-04 03:03:29
attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-30T06:04:32Z and 2020-06-30T06:30:58Z
2020-06-30 16:30:25
attack
2020-06-18T23:49:37.252601+02:00  sshd[4507]: Failed password for root from 201.48.192.60 port 41135 ssh2
2020-06-19 05:51:53
attackbots
Jun 17 19:16:14 home sshd[19824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
Jun 17 19:16:16 home sshd[19824]: Failed password for invalid user idc from 201.48.192.60 port 46028 ssh2
Jun 17 19:20:02 home sshd[20191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
...
2020-06-18 01:36:28
attack
Jun  7 22:13:01 ns382633 sshd\[29809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
Jun  7 22:13:03 ns382633 sshd\[29809\]: Failed password for root from 201.48.192.60 port 41851 ssh2
Jun  7 22:22:52 ns382633 sshd\[31560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
Jun  7 22:22:54 ns382633 sshd\[31560\]: Failed password for root from 201.48.192.60 port 40371 ssh2
Jun  7 22:26:16 ns382633 sshd\[32292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-06-08 06:21:29
attackbotsspam
leo_www
2020-06-06 07:02:57
attackspambots
2020-06-03T13:54:55.953765+02:00  sshd[16840]: Failed password for root from 201.48.192.60 port 44852 ssh2
2020-06-03 22:13:47
attackbots
2020-05-31T22:32:21.080545vps751288.ovh.net sshd\[30571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-05-31T22:32:23.031282vps751288.ovh.net sshd\[30571\]: Failed password for root from 201.48.192.60 port 48844 ssh2
2020-05-31T22:36:08.188884vps751288.ovh.net sshd\[30619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-05-31T22:36:10.300609vps751288.ovh.net sshd\[30619\]: Failed password for root from 201.48.192.60 port 34861 ssh2
2020-05-31T22:39:45.617188vps751288.ovh.net sshd\[30645\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60  user=root
2020-06-01 04:47:42
attack
2020-05-26T21:28:28.140477vivaldi2.tree2.info sshd[32725]: Invalid user vijaya from 201.48.192.60
2020-05-26T21:28:28.159432vivaldi2.tree2.info sshd[32725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
2020-05-26T21:28:28.140477vivaldi2.tree2.info sshd[32725]: Invalid user vijaya from 201.48.192.60
2020-05-26T21:28:30.307503vivaldi2.tree2.info sshd[32725]: Failed password for invalid user vijaya from 201.48.192.60 port 49956 ssh2
2020-05-26T21:32:24.372823vivaldi2.tree2.info sshd[491]: Invalid user hxhtftp from 201.48.192.60
...
2020-05-26 21:12:14
attackspam
"fail2ban match"
2020-05-23 16:04:28
attackspam
May 22 22:19:45 163-172-32-151 sshd[18125]: Invalid user odk from 201.48.192.60 port 47551
...
2020-05-23 04:23:18
attackbots
Invalid user uag from 201.48.192.60 port 49458
2020-05-21 06:16:08
attackbots
Apr 25 15:15:57 work-partkepr sshd\[16457\]: Invalid user ftpuser from 201.48.192.60 port 50524
Apr 25 15:15:57 work-partkepr sshd\[16457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.192.60
...
2020-04-26 01:28:57
attackspambots
Invalid user g from 201.48.192.60 port 44110
2020-04-24 19:22:42
attackspam
Invalid user g from 201.48.192.60 port 44110
2020-04-20 16:36:05
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.48.192.60
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.48.192.60.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022102 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 17:10:36 CST 2020
;; MSG SIZE  rcvd: 117
Host info
60.192.48.201.in-addr.arpa domain name pointer 201-048-192-060.static.ctbc.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
60.192.48.201.in-addr.arpa	name = 201-048-192-060.static.ctbc.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.131.84.103 attackbots
Jan  4 05:56:54 [munged] sshd[32498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.84.103
2020-01-04 13:16:52
45.136.108.117 attackbots
Jan  4 06:32:12 debian-2gb-nbg1-2 kernel: \[375257.916944\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.117 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=11229 PROTO=TCP SPT=41247 DPT=25254 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-04 13:34:30
82.123.40.225 attack
Unauthorized SSH login attempts
2020-01-04 13:11:09
80.24.111.17 attackspambots
$f2bV_matches
2020-01-04 13:45:53
101.79.62.143 attack
Jan  4 01:52:55 firewall sshd[10528]: Invalid user rtz from 101.79.62.143
Jan  4 01:52:58 firewall sshd[10528]: Failed password for invalid user rtz from 101.79.62.143 port 44432 ssh2
Jan  4 01:56:34 firewall sshd[10638]: Invalid user content from 101.79.62.143
...
2020-01-04 13:26:01
118.71.191.252 attack
1578113825 - 01/04/2020 05:57:05 Host: 118.71.191.252/118.71.191.252 Port: 445 TCP Blocked
2020-01-04 13:07:12
27.74.193.167 attack
DATE:2020-01-04 05:57:05, IP:27.74.193.167, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-01-04 13:08:29
103.61.29.20 attackbotsspam
Honeypot hit: [2020-01-04 07:56:52 +0300] Connected from 103.61.29.20 to (HoneypotIP):21
2020-01-04 13:17:20
190.115.1.49 attackbotsspam
Jan  3 18:54:26 wbs sshd\[17332\]: Invalid user lw from 190.115.1.49
Jan  3 18:54:26 wbs sshd\[17332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49
Jan  3 18:54:28 wbs sshd\[17332\]: Failed password for invalid user lw from 190.115.1.49 port 55670 ssh2
Jan  3 18:56:44 wbs sshd\[17531\]: Invalid user Else from 190.115.1.49
Jan  3 18:56:44 wbs sshd\[17531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.1.49
2020-01-04 13:21:31
157.230.128.181 attackbotsspam
2020-01-03T23:36:55.5547531495-001 sshd[26096]: Invalid user ypx from 157.230.128.181 port 46590
2020-01-03T23:36:55.5624841495-001 sshd[26096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.181
2020-01-03T23:36:55.5547531495-001 sshd[26096]: Invalid user ypx from 157.230.128.181 port 46590
2020-01-03T23:36:57.4671231495-001 sshd[26096]: Failed password for invalid user ypx from 157.230.128.181 port 46590 ssh2
2020-01-03T23:42:17.1565851495-001 sshd[26316]: Invalid user ainslie from 157.230.128.181 port 53592
2020-01-03T23:42:17.1652621495-001 sshd[26316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.128.181
2020-01-03T23:42:17.1565851495-001 sshd[26316]: Invalid user ainslie from 157.230.128.181 port 53592
2020-01-03T23:42:19.2758511495-001 sshd[26316]: Failed password for invalid user ainslie from 157.230.128.181 port 53592 ssh2
2020-01-03T23:43:55.6663211495-001 sshd[26379]: Inva
...
2020-01-04 13:46:54
113.161.71.73 attack
Jan  4 05:56:01  exim[16496]: SMTP syntax error in "HELO 6G?7809OY10136DR" H=[113.161.71.73] NULL character(s) present (shown as '?')
2020-01-04 13:45:25
171.5.224.44 attackbots
1578113784 - 01/04/2020 05:56:24 Host: 171.5.224.44/171.5.224.44 Port: 445 TCP Blocked
2020-01-04 13:32:02
61.220.182.187 attack
Jan  4 05:56:02 MK-Soft-VM7 sshd[10883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.220.182.187 
Jan  4 05:56:04 MK-Soft-VM7 sshd[10883]: Failed password for invalid user pe from 61.220.182.187 port 47194 ssh2
...
2020-01-04 13:43:03
35.206.156.221 attackspam
SSH Brute-Force reported by Fail2Ban
2020-01-04 13:41:07
85.93.52.99 attack
SSH Brute-Force reported by Fail2Ban
2020-01-04 13:42:49

Recently Reported IPs

163.209.32.131 120.8.98.75 109.191.175.170 103.15.140.140
118.89.21.128 59.126.145.214 176.194.226.202 156.96.47.27
85.103.199.30 189.50.252.238 119.29.92.35 14.241.242.2
156.236.119.100 92.198.37.59 181.194.19.207 218.83.199.244
223.111.144.153 138.121.220.60 77.88.47.163 157.245.251.22