Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: SR dos Santos Equipamentos Ltda

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
Brute-force attempt banned
2019-11-27 18:02:10
attackbots
Automatic report - Banned IP Access
2019-11-11 18:30:12
attackspam
[Aegis] @ 2019-11-08 07:27:55  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-11-08 16:51:02
attack
Oct 27 09:11:13 vps01 sshd[22867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
Oct 27 09:11:15 vps01 sshd[22867]: Failed password for invalid user pt from 200.150.74.114 port 65227 ssh2
2019-10-27 16:20:12
attackspambots
Oct  6 18:26:23 web9 sshd\[9552\]: Invalid user Machine@123 from 200.150.74.114
Oct  6 18:26:23 web9 sshd\[9552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
Oct  6 18:26:24 web9 sshd\[9552\]: Failed password for invalid user Machine@123 from 200.150.74.114 port 64563 ssh2
Oct  6 18:31:09 web9 sshd\[10259\]: Invalid user Image123 from 200.150.74.114
Oct  6 18:31:09 web9 sshd\[10259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
2019-10-07 12:37:08
attackspambots
Oct  5 21:36:45 vmanager6029 sshd\[30803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
Oct  5 21:36:47 vmanager6029 sshd\[30803\]: Failed password for root from 200.150.74.114 port 12286 ssh2
Oct  5 21:41:02 vmanager6029 sshd\[30938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
2019-10-06 04:34:49
attack
Oct  3 22:52:47 vmanager6029 sshd\[446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
Oct  3 22:52:49 vmanager6029 sshd\[446\]: Failed password for root from 200.150.74.114 port 59555 ssh2
Oct  3 22:57:55 vmanager6029 sshd\[542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114  user=root
2019-10-04 05:14:17
attackspam
Sep 29 13:47:33 dedicated sshd[6296]: Invalid user melev from 200.150.74.114 port 45971
2019-09-29 20:09:12
attack
Sep 21 14:58:48 MK-Soft-VM5 sshd[5840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114 
Sep 21 14:58:50 MK-Soft-VM5 sshd[5840]: Failed password for invalid user qwaszx from 200.150.74.114 port 62474 ssh2
...
2019-09-21 21:49:07
attackspambots
Sep 12 10:59:44 MK-Soft-VM6 sshd\[8028\]: Invalid user sinus from 200.150.74.114 port 53485
Sep 12 10:59:44 MK-Soft-VM6 sshd\[8028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
Sep 12 10:59:46 MK-Soft-VM6 sshd\[8028\]: Failed password for invalid user sinus from 200.150.74.114 port 53485 ssh2
...
2019-09-12 22:33:58
attack
SSH invalid-user multiple login try
2019-09-04 18:58:40
attackspam
Jul 29 00:27:49 mail sshd\[24604\]: Invalid user jingjucai from 200.150.74.114 port 10066
Jul 29 00:27:49 mail sshd\[24604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
...
2019-07-29 07:29:10
attackspam
Jun 25 10:04:43 srv-4 sshd\[23258\]: Invalid user hermann from 200.150.74.114
Jun 25 10:04:43 srv-4 sshd\[23258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.150.74.114
Jun 25 10:04:45 srv-4 sshd\[23258\]: Failed password for invalid user hermann from 200.150.74.114 port 39850 ssh2
...
2019-06-25 15:50:17
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.150.74.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9856
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.150.74.114.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 29 03:33:33 +08 2019
;; MSG SIZE  rcvd: 118

Host info
114.74.150.200.in-addr.arpa domain name pointer 114.74.150.200.static.copel.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
114.74.150.200.in-addr.arpa	name = 114.74.150.200.static.copel.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
51.83.193.144 attack
Jun 11 22:38:14 nextcloud sshd\[16373\]: Invalid user 123456 from 51.83.193.144
Jun 11 22:38:14 nextcloud sshd\[16373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.193.144
Jun 11 22:38:16 nextcloud sshd\[16373\]: Failed password for invalid user 123456 from 51.83.193.144 port 37058 ssh2
2020-06-12 06:11:06
122.51.202.157 attackbots
Jun 11 13:10:46 : SSH login attempts with invalid user
2020-06-12 06:13:52
162.243.135.167 attack
IP 162.243.135.167 attacked honeypot on port: 873 at 6/11/2020 9:38:10 PM
2020-06-12 06:04:19
35.202.177.121 attackspambots
Jun 11 23:27:24 ns41 sshd[16727]: Failed password for root from 35.202.177.121 port 60718 ssh2
Jun 11 23:27:24 ns41 sshd[16727]: Failed password for root from 35.202.177.121 port 60718 ssh2
2020-06-12 05:50:32
222.186.180.142 attackbotsspam
Jun 11 23:20:29 legacy sshd[5511]: Failed password for root from 222.186.180.142 port 50264 ssh2
Jun 11 23:20:31 legacy sshd[5511]: Failed password for root from 222.186.180.142 port 50264 ssh2
Jun 11 23:20:33 legacy sshd[5511]: Failed password for root from 222.186.180.142 port 50264 ssh2
...
2020-06-12 05:37:35
14.161.43.210 attackbotsspam
'IP reached maximum auth failures for a one day block'
2020-06-12 05:44:02
222.186.30.59 attackbotsspam
Jun 11 23:39:17 vps639187 sshd\[29930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.59  user=root
Jun 11 23:39:18 vps639187 sshd\[29930\]: Failed password for root from 222.186.30.59 port 57555 ssh2
Jun 11 23:39:20 vps639187 sshd\[29930\]: Failed password for root from 222.186.30.59 port 57555 ssh2
...
2020-06-12 05:48:55
59.10.5.156 attackbotsspam
2020-06-11T23:58:45.655158rocketchat.forhosting.nl sshd[15567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.10.5.156
2020-06-11T23:58:45.651782rocketchat.forhosting.nl sshd[15567]: Invalid user leroy from 59.10.5.156 port 37724
2020-06-11T23:58:47.644352rocketchat.forhosting.nl sshd[15567]: Failed password for invalid user leroy from 59.10.5.156 port 37724 ssh2
...
2020-06-12 06:06:56
45.118.151.85 attackbots
629. On Jun 11 2020 experienced a Brute Force SSH login attempt -> 74 unique times by 45.118.151.85.
2020-06-12 06:00:59
189.126.162.131 attack
Automatic report - Port Scan Attack
2020-06-12 06:01:36
185.173.35.21 attackbotsspam
srv02 Mass scanning activity detected Target: 3390  ..
2020-06-12 06:12:15
148.71.44.11 attack
fail2ban
2020-06-12 05:51:11
85.98.19.36 attackbotsspam
xmlrpc attack
2020-06-12 06:15:02
140.143.136.89 attackspambots
Jun 11 23:29:10 ns37 sshd[6543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
Jun 11 23:29:10 ns37 sshd[6543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.136.89
2020-06-12 05:42:10
27.71.227.197 attackspam
Jun 11 23:31:18 vps sshd[813637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.227.197
Jun 11 23:31:20 vps sshd[813637]: Failed password for invalid user tachosender from 27.71.227.197 port 43326 ssh2
Jun 11 23:34:25 vps sshd[824396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.227.197  user=root
Jun 11 23:34:27 vps sshd[824396]: Failed password for root from 27.71.227.197 port 59520 ssh2
Jun 11 23:37:27 vps sshd[838806]: Invalid user dingshizhe from 27.71.227.197 port 47484
...
2020-06-12 05:52:13

Recently Reported IPs

58.187.113.119 170.231.134.183 233.121.118.159 94.60.218.150
145.99.251.62 61.185.137.161 45.27.149.148 201.240.79.131
222.252.216.130 5.144.130.21 91.214.211.187 61.160.95.126
220.176.172.157 107.170.198.109 185.232.67.13 54.38.241.171
60.13.197.131 184.154.47.5 162.243.150.222 185.234.217.215