Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Belo Horizonte

Region: Minas Gerais

Country: Brazil

Internet Service Provider: Claro

Hostname: unknown

Organization: CLARO S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.80.148.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60466
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.80.148.129.			IN	A

;; AUTHORITY SECTION:
.			2235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 18 07:31:30 +08 2019
;; MSG SIZE  rcvd: 118

Host info
129.148.80.201.in-addr.arpa domain name pointer c9509481.virtua.com.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
129.148.80.201.in-addr.arpa	name = c9509481.virtua.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
77.247.108.77 attackbotsspam
Unauthorized connection attempt detected from IP address 77.247.108.77 to port 80 [T]
2020-01-11 01:01:02
218.253.69.134 attackspambots
SASL PLAIN auth failed: ruser=...
2020-01-11 00:39:36
122.227.42.48 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-01-11 00:35:04
222.186.175.183 attack
Jan 10 17:43:36 ns381471 sshd[21838]: Failed password for root from 222.186.175.183 port 62880 ssh2
Jan 10 17:43:48 ns381471 sshd[21838]: Failed password for root from 222.186.175.183 port 62880 ssh2
Jan 10 17:43:48 ns381471 sshd[21838]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 62880 ssh2 [preauth]
2020-01-11 00:49:14
115.72.29.115 attackspambots
Jan 10 13:57:44 grey postfix/smtpd\[30252\]: NOQUEUE: reject: RCPT from unknown\[115.72.29.115\]: 554 5.7.1 Service unavailable\; Client host \[115.72.29.115\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[115.72.29.115\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-11 00:41:57
222.186.175.163 attackspam
Jan 10 17:49:35 icinga sshd[25936]: Failed password for root from 222.186.175.163 port 36900 ssh2
Jan 10 17:49:48 icinga sshd[25936]: Failed password for root from 222.186.175.163 port 36900 ssh2
Jan 10 17:49:48 icinga sshd[25936]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 36900 ssh2 [preauth]
...
2020-01-11 00:55:02
31.184.194.114 attackbotsspam
Jan 10 15:14:24 sigma sshd\[3478\]: Invalid user test from 31.184.194.114Jan 10 15:14:26 sigma sshd\[3478\]: Failed password for invalid user test from 31.184.194.114 port 45526 ssh2
...
2020-01-11 00:51:44
119.28.104.62 attack
Jan 10 09:46:11 ws22vmsma01 sshd[101591]: Failed password for root from 119.28.104.62 port 45326 ssh2
Jan 10 09:57:47 ws22vmsma01 sshd[108574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.104.62
...
2020-01-11 00:37:08
222.186.30.76 attackspambots
Jan 10 17:51:49 dcd-gentoo sshd[5629]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Jan 10 17:51:51 dcd-gentoo sshd[5629]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Jan 10 17:51:49 dcd-gentoo sshd[5629]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Jan 10 17:51:51 dcd-gentoo sshd[5629]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Jan 10 17:51:49 dcd-gentoo sshd[5629]: User root from 222.186.30.76 not allowed because none of user's groups are listed in AllowGroups
Jan 10 17:51:51 dcd-gentoo sshd[5629]: error: PAM: Authentication failure for illegal user root from 222.186.30.76
Jan 10 17:51:51 dcd-gentoo sshd[5629]: Failed keyboard-interactive/pam for invalid user root from 222.186.30.76 port 52332 ssh2
...
2020-01-11 01:03:34
218.92.0.205 attackbots
Jan 10 16:39:17 zeus sshd[16088]: Failed password for root from 218.92.0.205 port 10288 ssh2
Jan 10 16:39:20 zeus sshd[16088]: Failed password for root from 218.92.0.205 port 10288 ssh2
Jan 10 16:39:23 zeus sshd[16088]: Failed password for root from 218.92.0.205 port 10288 ssh2
Jan 10 16:47:52 zeus sshd[16153]: Failed password for root from 218.92.0.205 port 29170 ssh2
2020-01-11 01:05:53
61.147.59.140 attackbots
01/10/2020-13:57:30.894042 61.147.59.140 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 62
2020-01-11 00:53:19
106.52.16.54 attackspam
" "
2020-01-11 00:47:14
36.27.29.58 attackbotsspam
2020-01-10 06:54:25 H=(163.com) [36.27.29.58]:58268 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.2, 127.0.0.4) (https://www.spamhaus.org/query/ip/36.27.29.58)
2020-01-10 06:55:11 H=(163.com) [36.27.29.58]:60578 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.11, 127.0.0.2, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBL467991)
2020-01-10 06:57:39 H=(163.com) [36.27.29.58]:51806 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.2, 127.0.0.11) (https://www.spamhaus.org/sbl/query/SBL467991)
...
2020-01-11 00:46:42
171.225.253.48 attackspambots
Jan 10 13:57:51 grey postfix/smtpd\[26125\]: NOQUEUE: reject: RCPT from unknown\[171.225.253.48\]: 554 5.7.1 Service unavailable\; Client host \[171.225.253.48\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?171.225.253.48\; from=\ to=\ proto=ESMTP helo=\<\[171.225.253.48\]\>
...
2020-01-11 00:34:18
27.78.14.83 attack
Jan 10 17:43:26 icinga sshd[55990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.14.83 
Jan 10 17:43:28 icinga sshd[55990]: Failed password for invalid user user from 27.78.14.83 port 43900 ssh2
Jan 10 17:43:45 icinga sshd[56352]: Failed password for root from 27.78.14.83 port 40628 ssh2
...
2020-01-11 01:13:20

Recently Reported IPs

212.156.49.62 211.254.215.102 80.211.61.236 54.36.150.164
42.236.102.3 148.204.64.136 218.25.227.40 90.74.52.246
52.173.133.229 99.97.210.56 122.176.85.148 34.73.31.119
114.42.251.30 178.20.178.72 123.207.34.112 178.128.51.213
165.22.159.9 1.223.26.13 73.92.116.135 191.193.160.135