Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Algar Telecom S/A

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Aug 17 13:45:47 ns392434 sshd[10934]: Invalid user b from 201.48.4.15 port 57156
Aug 17 13:45:47 ns392434 sshd[10934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Aug 17 13:45:47 ns392434 sshd[10934]: Invalid user b from 201.48.4.15 port 57156
Aug 17 13:45:49 ns392434 sshd[10934]: Failed password for invalid user b from 201.48.4.15 port 57156 ssh2
Aug 17 13:57:21 ns392434 sshd[11371]: Invalid user admin from 201.48.4.15 port 58388
Aug 17 13:57:21 ns392434 sshd[11371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Aug 17 13:57:21 ns392434 sshd[11371]: Invalid user admin from 201.48.4.15 port 58388
Aug 17 13:57:23 ns392434 sshd[11371]: Failed password for invalid user admin from 201.48.4.15 port 58388 ssh2
Aug 17 14:05:12 ns392434 sshd[11616]: Invalid user email from 201.48.4.15 port 39004
2020-08-17 22:09:34
attackbotsspam
SSH Invalid Login
2020-04-28 07:19:36
attackbotsspam
Feb 10 16:41:23 lukav-desktop sshd\[10296\]: Invalid user nc from 201.48.4.15
Feb 10 16:41:23 lukav-desktop sshd\[10296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Feb 10 16:41:25 lukav-desktop sshd\[10296\]: Failed password for invalid user nc from 201.48.4.15 port 57118 ssh2
Feb 10 16:44:32 lukav-desktop sshd\[10309\]: Invalid user kic from 201.48.4.15
Feb 10 16:44:32 lukav-desktop sshd\[10309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
2020-02-10 22:51:34
attackspam
Unauthorized connection attempt detected from IP address 201.48.4.15 to port 2220 [J]
2020-01-07 03:28:52
attackbots
Dec 25 17:49:25 localhost sshd\[29151\]: Invalid user nath from 201.48.4.15 port 45670
Dec 25 17:49:25 localhost sshd\[29151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Dec 25 17:49:27 localhost sshd\[29151\]: Failed password for invalid user nath from 201.48.4.15 port 45670 ssh2
2019-12-26 01:06:28
attackbotsspam
Dec  8 06:27:06 ns381471 sshd[15132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Dec  8 06:27:08 ns381471 sshd[15132]: Failed password for invalid user fanuha from 201.48.4.15 port 36964 ssh2
2019-12-08 13:52:02
attackspambots
Nov 30 05:30:03 areeb-Workstation sshd[29277]: Failed password for root from 201.48.4.15 port 52106 ssh2
...
2019-11-30 08:22:13
attackspam
Nov 27 07:33:52 server sshd\[5389\]: Invalid user test from 201.48.4.15
Nov 27 07:33:52 server sshd\[5389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15 
Nov 27 07:33:54 server sshd\[5389\]: Failed password for invalid user test from 201.48.4.15 port 57060 ssh2
Nov 27 07:58:12 server sshd\[11421\]: Invalid user informix from 201.48.4.15
Nov 27 07:58:12 server sshd\[11421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15 
...
2019-11-27 13:02:45
attack
Nov 24 12:29:54 vibhu-HP-Z238-Microtower-Workstation sshd\[12863\]: Invalid user wwwrun from 201.48.4.15
Nov 24 12:29:54 vibhu-HP-Z238-Microtower-Workstation sshd\[12863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Nov 24 12:29:56 vibhu-HP-Z238-Microtower-Workstation sshd\[12863\]: Failed password for invalid user wwwrun from 201.48.4.15 port 55834 ssh2
Nov 24 12:34:21 vibhu-HP-Z238-Microtower-Workstation sshd\[13001\]: Invalid user guest from 201.48.4.15
Nov 24 12:34:21 vibhu-HP-Z238-Microtower-Workstation sshd\[13001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
...
2019-11-24 15:08:23
attackbotsspam
5x Failed Password
2019-11-20 00:32:13
attack
2019-11-08T23:38:05.911289abusebot-3.cloudsearch.cf sshd\[11946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15  user=root
2019-11-09 08:07:09
attackspambots
Nov  2 14:11:00 vps01 sshd[16648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Nov  2 14:11:01 vps01 sshd[16648]: Failed password for invalid user erwin from 201.48.4.15 port 45772 ssh2
2019-11-02 23:48:57
attackspambots
$f2bV_matches
2019-10-29 17:26:58
attackspambots
Feb 24 23:08:53 odroid64 sshd\[12660\]: Invalid user steam from 201.48.4.15
Feb 24 23:08:53 odroid64 sshd\[12660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Feb 24 23:08:54 odroid64 sshd\[12660\]: Failed password for invalid user steam from 201.48.4.15 port 41046 ssh2
Mar  7 16:23:45 odroid64 sshd\[19838\]: Invalid user mms from 201.48.4.15
Mar  7 16:23:45 odroid64 sshd\[19838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Mar  7 16:23:47 odroid64 sshd\[19838\]: Failed password for invalid user mms from 201.48.4.15 port 47538 ssh2
...
2019-10-18 04:29:04
attackspambots
$f2bV_matches
2019-10-16 20:53:21
attackspam
Sep 22 03:06:50 mail sshd\[8742\]: Invalid user sj from 201.48.4.15 port 59902
Sep 22 03:06:50 mail sshd\[8742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
Sep 22 03:06:52 mail sshd\[8742\]: Failed password for invalid user sj from 201.48.4.15 port 59902 ssh2
Sep 22 03:12:07 mail sshd\[9384\]: Invalid user doomi from 201.48.4.15 port 46942
Sep 22 03:12:07 mail sshd\[9384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.4.15
2019-09-22 09:23:44
Comments on same subnet:
IP Type Details Datetime
201.48.40.153 attack
Oct  1 16:07:08 raspberrypi sshd[23988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153 
Oct  1 16:07:09 raspberrypi sshd[23988]: Failed password for invalid user git from 201.48.40.153 port 44047 ssh2
...
2020-10-02 03:23:04
201.48.40.153 attackbotsspam
Oct  1 10:18:21 scw-6657dc sshd[25458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153
Oct  1 10:18:21 scw-6657dc sshd[25458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153
Oct  1 10:18:23 scw-6657dc sshd[25458]: Failed password for invalid user student6 from 201.48.40.153 port 51114 ssh2
...
2020-10-01 19:35:52
201.48.40.153 attack
(sshd) Failed SSH login from 201.48.40.153 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 09:04:10 vps sshd[20866]: Invalid user support from 201.48.40.153 port 46993
Sep  4 09:04:11 vps sshd[20866]: Failed password for invalid user support from 201.48.40.153 port 46993 ssh2
Sep  4 09:05:16 vps sshd[21333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153  user=root
Sep  4 09:05:18 vps sshd[21333]: Failed password for root from 201.48.40.153 port 52622 ssh2
Sep  4 09:06:07 vps sshd[21754]: Invalid user zzk from 201.48.40.153 port 56992
2020-09-04 20:57:10
201.48.40.153 attackbotsspam
2020-09-03T13:37:17.2158031495-001 sshd[63369]: Failed password for root from 201.48.40.153 port 56064 ssh2
2020-09-03T13:41:43.6917091495-001 sshd[63552]: Invalid user zj from 201.48.40.153 port 58643
2020-09-03T13:41:43.6966131495-001 sshd[63552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153
2020-09-03T13:41:43.6917091495-001 sshd[63552]: Invalid user zj from 201.48.40.153 port 58643
2020-09-03T13:41:46.2585241495-001 sshd[63552]: Failed password for invalid user zj from 201.48.40.153 port 58643 ssh2
2020-09-03T13:46:04.9252511495-001 sshd[63753]: Invalid user test from 201.48.40.153 port 32987
...
2020-09-04 12:36:16
201.48.40.153 attackspam
2020-09-03T13:37:17.2158031495-001 sshd[63369]: Failed password for root from 201.48.40.153 port 56064 ssh2
2020-09-03T13:41:43.6917091495-001 sshd[63552]: Invalid user zj from 201.48.40.153 port 58643
2020-09-03T13:41:43.6966131495-001 sshd[63552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153
2020-09-03T13:41:43.6917091495-001 sshd[63552]: Invalid user zj from 201.48.40.153 port 58643
2020-09-03T13:41:46.2585241495-001 sshd[63552]: Failed password for invalid user zj from 201.48.40.153 port 58643 ssh2
2020-09-03T13:46:04.9252511495-001 sshd[63753]: Invalid user test from 201.48.40.153 port 32987
...
2020-09-04 05:06:06
201.48.40.153 attack
frenzy
2020-08-24 16:56:27
201.48.40.153 attackspambots
Invalid user vps from 201.48.40.153 port 43283
2020-08-23 01:30:51
201.48.40.153 attackbots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-18T15:53:28Z and 2020-08-18T16:01:11Z
2020-08-19 01:48:08
201.48.40.153 attack
Aug 18 01:00:07 george sshd[31655]: Invalid user cjw from 201.48.40.153 port 52755
Aug 18 01:00:07 george sshd[31655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153 
Aug 18 01:00:08 george sshd[31655]: Failed password for invalid user cjw from 201.48.40.153 port 52755 ssh2
Aug 18 01:01:30 george sshd[31682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.40.153  user=root
Aug 18 01:01:32 george sshd[31682]: Failed password for root from 201.48.40.153 port 60451 ssh2
...
2020-08-18 14:32:36
201.48.40.153 attackspambots
ssh intrusion attempt
2020-08-11 08:16:39
201.48.40.153 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 01:20:33
201.48.40.153 attack
Scanned 6 times in the last 24 hours on port 22
2020-08-09 08:14:29
201.48.40.153 attack
$f2bV_matches
2020-08-05 20:42:43
201.48.40.153 attackspam
Invalid user uftp from 201.48.40.153 port 41507
2020-07-27 06:28:51
201.48.40.153 attackbotsspam
SSH Invalid Login
2020-07-11 06:08:42
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.48.4.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5550
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.48.4.15.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092101 1800 900 604800 86400

;; Query time: 738 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 22 09:23:41 CST 2019
;; MSG SIZE  rcvd: 115
Host info
15.4.48.201.in-addr.arpa domain name pointer 201-048-004-015.static.ctbctelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.4.48.201.in-addr.arpa	name = 201-048-004-015.static.ctbctelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2001:41d0:a:f94a::1 attackbotsspam
WordPress wp-login brute force :: 2001:41d0:a:f94a::1 0.116 BYPASS [25/May/2020:03:55:30  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2288 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-25 12:45:29
49.234.31.158 attack
May 25 06:45:54 vpn01 sshd[4198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.31.158
May 25 06:45:57 vpn01 sshd[4198]: Failed password for invalid user rr from 49.234.31.158 port 60964 ssh2
...
2020-05-25 13:02:30
185.88.100.17 attackspambots
Chat Spam
2020-05-25 12:55:15
123.206.90.149 attackspam
May 25 06:34:21 plex sshd[7231]: Invalid user larry from 123.206.90.149 port 54837
2020-05-25 12:37:34
120.133.1.16 attack
$f2bV_matches
2020-05-25 12:53:14
94.42.165.180 attackspambots
May 25 07:25:11 journals sshd\[124991\]: Invalid user admin from 94.42.165.180
May 25 07:25:11 journals sshd\[124991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.165.180
May 25 07:25:13 journals sshd\[124991\]: Failed password for invalid user admin from 94.42.165.180 port 46903 ssh2
May 25 07:28:43 journals sshd\[125355\]: Invalid user alec from 94.42.165.180
May 25 07:28:43 journals sshd\[125355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.165.180
...
2020-05-25 12:34:34
106.12.222.60 attackspam
May 25 05:52:42 vps647732 sshd[11376]: Failed password for root from 106.12.222.60 port 39002 ssh2
...
2020-05-25 12:35:49
178.62.0.138 attackspambots
May 25 05:52:12 vpn01 sshd[3446]: Failed password for root from 178.62.0.138 port 39165 ssh2
...
2020-05-25 12:27:17
211.213.198.139 attackbotsspam
May 25 06:33:38 abendstille sshd\[18949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139  user=root
May 25 06:33:41 abendstille sshd\[18949\]: Failed password for root from 211.213.198.139 port 44742 ssh2
May 25 06:35:28 abendstille sshd\[20990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139  user=root
May 25 06:35:29 abendstille sshd\[20990\]: Failed password for root from 211.213.198.139 port 40134 ssh2
May 25 06:37:20 abendstille sshd\[23080\]: Invalid user owen from 211.213.198.139
May 25 06:37:20 abendstille sshd\[23080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.213.198.139
...
2020-05-25 12:40:59
167.172.139.65 attack
Auto reported by IDS
2020-05-25 12:42:39
37.152.182.18 attack
May 24 18:40:15 hpm sshd\[8812\]: Invalid user share from 37.152.182.18
May 24 18:40:15 hpm sshd\[8812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.182.18
May 24 18:40:18 hpm sshd\[8812\]: Failed password for invalid user share from 37.152.182.18 port 53414 ssh2
May 24 18:43:30 hpm sshd\[9035\]: Invalid user yy from 37.152.182.18
May 24 18:43:30 hpm sshd\[9035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.152.182.18
2020-05-25 12:58:08
138.185.37.234 attackbotsspam
port scan and connect, tcp 80 (http)
2020-05-25 12:41:45
87.251.74.48 attack
IP blocked
2020-05-25 12:24:39
112.17.173.204 attackspam
SSH Brute Force
2020-05-25 12:46:00
79.173.253.50 attack
SSH bruteforce
2020-05-25 12:48:26

Recently Reported IPs

222.163.139.54 116.204.185.210 189.26.67.147 110.77.148.218
207.148.78.105 14.167.111.31 203.34.37.44 160.170.169.94
178.35.233.210 46.101.130.213 157.245.228.254 170.28.141.88
1.52.59.228 49.81.106.213 139.213.169.210 17.3.30.242
187.8.80.157 84.9.195.217 29.161.2.87 71.33.120.242