Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Belo Horizonte

Region: Minas Gerais

Country: Brazil

Internet Service Provider: Claro

Hostname: unknown

Organization: CLARO S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.80.148.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60466
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;201.80.148.129.			IN	A

;; AUTHORITY SECTION:
.			2235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 18 07:31:30 +08 2019
;; MSG SIZE  rcvd: 118

Host info
129.148.80.201.in-addr.arpa domain name pointer c9509481.virtua.com.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
129.148.80.201.in-addr.arpa	name = c9509481.virtua.com.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
36.81.4.119 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-10 14:50:58
144.76.225.165 attackbotsspam
cae-0 : Trying access unauthorized files=>/libraries/joomla/installer/adapters/data.php()
2020-04-10 15:21:23
46.101.19.133 attackbotsspam
Apr 10 07:33:18 host5 sshd[24868]: Invalid user butter from 46.101.19.133 port 59369
...
2020-04-10 15:02:59
162.243.126.96 attackspam
REQUESTED PAGE: /wp-content/themes/calliope/db.php?u=true
2020-04-10 15:14:05
93.99.104.137 attackspam
sql injection via query parameters
2020-04-10 15:06:28
134.209.147.198 attack
Apr 10 06:58:28 pve sshd[10277]: Failed password for root from 134.209.147.198 port 52986 ssh2
Apr 10 07:03:10 pve sshd[11037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.147.198 
Apr 10 07:03:12 pve sshd[11037]: Failed password for invalid user postgres from 134.209.147.198 port 53242 ssh2
2020-04-10 15:05:53
106.13.31.176 attackbots
Apr 10 05:47:55 v22018086721571380 sshd[24098]: Failed password for invalid user kafka from 106.13.31.176 port 45820 ssh2
2020-04-10 15:09:32
212.81.57.188 attackspam
Apr 10 05:56:06 smtp postfix/smtpd[13360]: NOQUEUE: reject: RCPT from liquid.chocualo.com[212.81.57.188]: 554 5.7.1 Service unavailable; Client host [212.81.57.188] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/sbl/query/SBL440932; from= to= proto=ESMTP helo=
...
2020-04-10 14:54:41
159.203.176.82 attack
CMS (WordPress or Joomla) login attempt.
2020-04-10 14:47:58
202.179.76.187 attack
$f2bV_matches
2020-04-10 15:13:43
114.67.100.245 attackbotsspam
Apr 10 05:55:58  sshd\[19791\]: Invalid user firebird from 114.67.100.245Apr 10 05:56:00  sshd\[19791\]: Failed password for invalid user firebird from 114.67.100.245 port 41358 ssh2
...
2020-04-10 15:01:06
103.58.249.82 attackspambots
DATE:2020-04-10 05:55:34, IP:103.58.249.82, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-04-10 15:22:55
134.209.236.191 attack
Apr 10 03:03:30 Tower sshd[1036]: Connection from 134.209.236.191 port 40072 on 192.168.10.220 port 22 rdomain ""
Apr 10 03:03:38 Tower sshd[1036]: Invalid user gaurav from 134.209.236.191 port 40072
Apr 10 03:03:38 Tower sshd[1036]: error: Could not get shadow information for NOUSER
Apr 10 03:03:38 Tower sshd[1036]: Failed password for invalid user gaurav from 134.209.236.191 port 40072 ssh2
Apr 10 03:03:38 Tower sshd[1036]: Received disconnect from 134.209.236.191 port 40072:11: Bye Bye [preauth]
Apr 10 03:03:38 Tower sshd[1036]: Disconnected from invalid user gaurav 134.209.236.191 port 40072 [preauth]
2020-04-10 15:20:16
47.180.212.134 attackspambots
$f2bV_matches
2020-04-10 15:11:55
211.169.248.209 attack
SSH brute-force: detected 11 distinct usernames within a 24-hour window.
2020-04-10 15:10:39

Recently Reported IPs

212.156.49.62 211.254.215.102 80.211.61.236 54.36.150.164
42.236.102.3 148.204.64.136 218.25.227.40 90.74.52.246
52.173.133.229 99.97.210.56 122.176.85.148 34.73.31.119
114.42.251.30 178.20.178.72 123.207.34.112 178.128.51.213
165.22.159.9 1.223.26.13 73.92.116.135 191.193.160.135