Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.71.142.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16059
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.71.142.69.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 29 16:38:23 CST 2024
;; MSG SIZE  rcvd: 106
Host info
69.142.71.201.in-addr.arpa domain name pointer 201-71-142-69.dynamic.younet.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.142.71.201.in-addr.arpa	name = 201-71-142-69.dynamic.younet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.136.193.147 attack
Invalid user debian from 52.136.193.147 port 47604
2020-02-20 08:38:28
178.128.114.248 attackspam
Feb 19 22:55:01 debian-2gb-nbg1-2 kernel: \[4408513.782028\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=178.128.114.248 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x40 TTL=242 ID=6120 PROTO=TCP SPT=32767 DPT=8545 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-20 08:36:27
179.63.252.138 attackspambots
Port probing on unauthorized port 23
2020-02-20 09:14:18
64.32.7.74 attack
64.32.7.74 was recorded 13 times by 9 hosts attempting to connect to the following ports: 3702,30120. Incident counter (4h, 24h, all-time): 13, 13, 13
2020-02-20 09:01:43
92.118.37.86 attackbotsspam
Feb 20 01:28:09 debian-2gb-nbg1-2 kernel: \[4417701.159621\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=19770 PROTO=TCP SPT=41305 DPT=171 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-20 08:38:02
2001:470:dfa9:10ff:0:242:ac11:18 attackbots
Port scan
2020-02-20 09:09:42
196.43.155.209 attackbots
(sshd) Failed SSH login from 196.43.155.209 (UG/Uganda/-/-/-/[AS327687 RENU]): 1 in the last 3600 secs
2020-02-20 08:55:45
185.216.140.6 attack
*Port Scan* detected from 185.216.140.6 (NL/Netherlands/security.criminalip.com). 4 hits in the last 150 seconds
2020-02-20 08:36:08
188.166.119.55 attackspambots
SSH brute force
2020-02-20 09:14:46
212.95.137.164 attackspam
Feb 19 14:30:25 sachi sshd\[8422\]: Invalid user zhup from 212.95.137.164
Feb 19 14:30:25 sachi sshd\[8422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164
Feb 19 14:30:27 sachi sshd\[8422\]: Failed password for invalid user zhup from 212.95.137.164 port 48990 ssh2
Feb 19 14:32:36 sachi sshd\[8586\]: Invalid user es from 212.95.137.164
Feb 19 14:32:36 sachi sshd\[8586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164
2020-02-20 08:56:53
2001:470:dfa9:10ff:0:242:ac11:17 attackbots
Port scan
2020-02-20 09:10:51
2001:470:dfa9:10ff:0:242:ac11:2b attack
Port scan
2020-02-20 08:43:03
162.243.132.203 attackspam
Automatic report - Port Scan Attack
2020-02-20 08:58:59
223.171.32.56 attackbots
Invalid user tdas from 223.171.32.56 port 16757
2020-02-20 09:02:13
2001:470:dfa9:10ff:0:242:ac11:1e attackbotsspam
Port scan
2020-02-20 09:04:32

Recently Reported IPs

77.68.35.1 116.96.60.153 143.232.127.11 186.145.248.108
42.43.139.40 45.39.160.98 111.5.131.141 241.206.38.142
85.142.0.24 209.17.105.11 57.114.245.29 83.208.88.183
146.251.129.62 254.121.144.176 235.55.211.156 109.132.83.149
43.195.254.189 35.177.34.210 232.2.226.246 100.29.9.179