Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Contagem

Region: Minas Gerais

Country: Brazil

Internet Service Provider: Brasil Telecomunicacoes S.A.

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 189.14.135.202 to port 2220 [J]
2020-02-01 07:42:55
attackspambots
2019-12-13T09:53:56.081057suse-nuc sshd[26272]: Invalid user kortje from 189.14.135.202 port 41704
...
2020-01-21 05:20:26
attackspambots
Unauthorized connection attempt detected from IP address 189.14.135.202 to port 2220 [J]
2020-01-13 00:22:21
attackbots
SSH login attempts.
2020-01-04 13:53:41
attack
Automatic report - Banned IP Access
2020-01-01 23:03:22
attackspambots
Dec 11 06:44:26 andromeda sshd\[23657\]: Invalid user news from 189.14.135.202 port 43294
Dec 11 06:44:26 andromeda sshd\[23657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.14.135.202
Dec 11 06:44:28 andromeda sshd\[23657\]: Failed password for invalid user news from 189.14.135.202 port 43294 ssh2
2019-12-11 13:47:14
attackspambots
SSH/22 MH Probe, BF, Hack -
2019-11-01 19:56:31
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.14.135.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9881
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.14.135.202.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110100 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 19:56:28 CST 2019
;; MSG SIZE  rcvd: 118
Host info
202.135.14.189.in-addr.arpa domain name pointer bd0e87ca.virtua.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
202.135.14.189.in-addr.arpa	name = bd0e87ca.virtua.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
220.173.55.8 attackbots
fraudulent SSH attempt
2019-11-20 04:18:29
148.66.135.178 attack
Invalid user lisa from 148.66.135.178 port 42890
2019-11-20 04:33:17
123.21.3.255 attackspambots
Invalid user admin from 123.21.3.255 port 58425
2019-11-20 04:38:16
186.12.172.52 attackbotsspam
Invalid user admin from 186.12.172.52 port 41270
2019-11-20 04:27:32
106.12.17.43 attackspam
Invalid user atsuyuki from 106.12.17.43 port 48616
2019-11-20 04:08:39
106.13.7.186 attackspambots
Nov 19 19:52:52 DAAP sshd[14858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.7.186  user=root
Nov 19 19:52:54 DAAP sshd[14858]: Failed password for root from 106.13.7.186 port 32988 ssh2
Nov 19 19:56:48 DAAP sshd[14875]: Invalid user julio from 106.13.7.186 port 41770
Nov 19 19:56:48 DAAP sshd[14875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.7.186
Nov 19 19:56:48 DAAP sshd[14875]: Invalid user julio from 106.13.7.186 port 41770
Nov 19 19:56:49 DAAP sshd[14875]: Failed password for invalid user julio from 106.13.7.186 port 41770 ssh2
...
2019-11-20 04:07:28
5.196.226.217 attackbotsspam
fraudulent SSH attempt
2019-11-20 04:15:39
123.21.159.217 attack
Invalid user admin from 123.21.159.217 port 40145
2019-11-20 04:37:54
109.224.57.42 attack
Invalid user admin from 109.224.57.42 port 58230
2019-11-20 04:40:41
170.247.123.100 attack
Invalid user admin from 170.247.123.100 port 44182
2019-11-20 04:31:47
165.22.61.82 attackbotsspam
Nov 19 16:58:37 h2177944 sshd\[21678\]: Invalid user fort from 165.22.61.82 port 49738
Nov 19 16:58:37 h2177944 sshd\[21678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.61.82
Nov 19 16:58:39 h2177944 sshd\[21678\]: Failed password for invalid user fort from 165.22.61.82 port 49738 ssh2
Nov 19 17:02:53 h2177944 sshd\[22235\]: Invalid user password1 from 165.22.61.82 port 58116
...
2019-11-20 04:32:04
88.184.217.236 attackbots
Invalid user pi from 88.184.217.236 port 59726
2019-11-20 04:43:45
90.151.153.120 attackbots
Invalid user admin from 90.151.153.120 port 60013
2019-11-20 04:43:17
31.179.144.190 attack
Nov 19 20:28:15 server sshd\[18766\]: Invalid user yoyo from 31.179.144.190
Nov 19 20:28:15 server sshd\[18766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.144.190 
Nov 19 20:28:17 server sshd\[18766\]: Failed password for invalid user yoyo from 31.179.144.190 port 55534 ssh2
Nov 19 20:37:57 server sshd\[21196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.179.144.190  user=root
Nov 19 20:37:59 server sshd\[21196\]: Failed password for root from 31.179.144.190 port 59934 ssh2
...
2019-11-20 04:15:21
103.85.63.253 attackspam
Nov 19 19:34:39 work-partkepr sshd\[5159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.85.63.253  user=root
Nov 19 19:34:40 work-partkepr sshd\[5159\]: Failed password for root from 103.85.63.253 port 56766 ssh2
...
2019-11-20 04:09:35

Recently Reported IPs

222.238.169.182 211.98.169.20 243.48.33.155 162.88.248.239
200.223.167.218 23.135.146.179 1.10.175.183 107.76.31.21
185.1.195.12 163.68.125.115 242.6.52.98 135.100.174.123
7.122.242.71 185.132.53.28 178.199.85.228 55.174.199.41
68.144.59.106 36.155.102.111 96.237.44.183 46.229.194.7