Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Vivo S.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Lines containing failures of 200.148.138.53
May 19 10:45:56 nexus sshd[4135]: Invalid user cloudera from 200.148.138.53 port 1801
May 19 10:45:56 nexus sshd[4135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.148.138.53
May 19 10:45:58 nexus sshd[4135]: Failed password for invalid user cloudera from 200.148.138.53 port 1801 ssh2
May 19 10:45:58 nexus sshd[4135]: Connection closed by 200.148.138.53 port 1801 [preauth]
May 19 11:25:00 nexus sshd[4767]: Invalid user cmc from 200.148.138.53 port 1801
May 19 11:25:00 nexus sshd[4767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.148.138.53


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=200.148.138.53
2020-05-20 02:37:38
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.148.138.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18602
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.148.138.53.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051901 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 02:37:35 CST 2020
;; MSG SIZE  rcvd: 118
Host info
53.138.148.200.in-addr.arpa domain name pointer 200-148-138-53.ibinet.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.138.148.200.in-addr.arpa	name = 200-148-138-53.ibinet.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.38.237.78 attack
Sep  5 21:14:44 MK-Soft-VM4 sshd\[18753\]: Invalid user user from 51.38.237.78 port 41248
Sep  5 21:14:44 MK-Soft-VM4 sshd\[18753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.237.78
Sep  5 21:14:46 MK-Soft-VM4 sshd\[18753\]: Failed password for invalid user user from 51.38.237.78 port 41248 ssh2
...
2019-09-06 05:37:17
111.230.234.206 attackspam
Sep  5 11:32:34 hiderm sshd\[4062\]: Invalid user 233 from 111.230.234.206
Sep  5 11:32:34 hiderm sshd\[4062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.234.206
Sep  5 11:32:36 hiderm sshd\[4062\]: Failed password for invalid user 233 from 111.230.234.206 port 60238 ssh2
Sep  5 11:36:42 hiderm sshd\[4395\]: Invalid user 36 from 111.230.234.206
Sep  5 11:36:42 hiderm sshd\[4395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.234.206
2019-09-06 05:43:02
185.137.168.72 attackspam
fire
2019-09-06 05:41:55
103.139.45.230 attack
firewall-block, port(s): 3389/tcp
2019-09-06 05:39:00
103.119.145.130 attackspam
Sep  5 16:43:37 lvps83-169-44-148 sshd[21479]: reveeclipse mapping checking getaddrinfo for ip-145-130.balifiber.id [103.119.145.130] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep  5 16:43:37 lvps83-169-44-148 sshd[21479]: Invalid user deployer from 103.119.145.130
Sep  5 16:43:37 lvps83-169-44-148 sshd[21479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.145.130 
Sep  5 16:43:40 lvps83-169-44-148 sshd[21479]: Failed password for invalid user deployer from 103.119.145.130 port 38904 ssh2
Sep  5 17:21:26 lvps83-169-44-148 sshd[25494]: reveeclipse mapping checking getaddrinfo for ip-145-130.balifiber.id [103.119.145.130] failed - POSSIBLE BREAK-IN ATTEMPT!
Sep  5 17:21:26 lvps83-169-44-148 sshd[25494]: Invalid user minecraft from 103.119.145.130
Sep  5 17:21:26 lvps83-169-44-148 sshd[25494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.145.130 
Sep  5 17:21:28 lvps83-169-44-148........
-------------------------------
2019-09-06 05:46:40
118.25.61.76 attackbotsspam
Sep  5 22:36:27 dedicated sshd[20395]: Invalid user vb0x from 118.25.61.76 port 45386
2019-09-06 06:05:39
220.163.107.130 attack
Automatic report - Banned IP Access
2019-09-06 06:01:51
63.143.98.72 attackspambots
Telnet Server BruteForce Attack
2019-09-06 05:30:42
188.92.75.248 attackspambots
Sep  5 22:38:34 vps sshd[6805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.92.75.248 
Sep  5 22:38:36 vps sshd[6805]: Failed password for invalid user 0 from 188.92.75.248 port 21832 ssh2
Sep  5 22:38:53 vps sshd[6817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.92.75.248 
...
2019-09-06 05:25:49
142.93.199.72 attackbots
Sep  5 11:12:40 hcbb sshd\[1691\]: Invalid user tester from 142.93.199.72
Sep  5 11:12:40 hcbb sshd\[1691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.199.72
Sep  5 11:12:42 hcbb sshd\[1691\]: Failed password for invalid user tester from 142.93.199.72 port 60006 ssh2
Sep  5 11:17:10 hcbb sshd\[2095\]: Invalid user test2 from 142.93.199.72
Sep  5 11:17:10 hcbb sshd\[2095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.199.72
2019-09-06 05:34:05
68.183.113.232 attackspam
Sep  5 23:18:42 core sshd[27929]: Invalid user 123456 from 68.183.113.232 port 44608
Sep  5 23:18:44 core sshd[27929]: Failed password for invalid user 123456 from 68.183.113.232 port 44608 ssh2
...
2019-09-06 05:41:24
217.182.225.25 attackspam
Sep  5 11:39:05 aiointranet sshd\[14661\]: Invalid user musikbot from 217.182.225.25
Sep  5 11:39:05 aiointranet sshd\[14661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.225.25
Sep  5 11:39:07 aiointranet sshd\[14661\]: Failed password for invalid user musikbot from 217.182.225.25 port 36744 ssh2
Sep  5 11:44:00 aiointranet sshd\[15155\]: Invalid user guest from 217.182.225.25
Sep  5 11:44:00 aiointranet sshd\[15155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.225.25
2019-09-06 05:50:07
184.154.47.2 attackbots
fire
2019-09-06 05:44:36
185.216.140.16 attack
09/05/2019-16:30:32.410817 185.216.140.16 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-06 05:41:08
156.96.157.183 attack
2019-09-05T21:08:55.612861 X postfix/smtpd[13011]: NOQUEUE: reject: RCPT from unknown[156.96.157.183]: 554 5.7.1 Service unavailable; Client host [156.96.157.183] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/156.96.157.183; from= to= proto=ESMTP helo=
2019-09-06 05:43:22

Recently Reported IPs

200.125.239.22 85.16.171.131 197.156.72.66 210.75.7.85
83.220.239.21 45.65.229.159 197.248.97.125 141.138.169.210
14.242.200.251 49.235.56.155 36.90.62.141 85.29.140.54
36.52.137.88 186.114.153.106 135.208.249.177 217.121.143.176
63.83.75.32 5.196.93.77 173.249.22.74 190.186.0.50