Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Argentina

Internet Service Provider: Universidad Nacional de Rio Cuarto

Hostname: unknown

Organization: unknown

Usage Type: University/College/School

Comments:
Type Details Datetime
attackbots
2020-04-25T04:54:23.462541shield sshd\[20680\]: Invalid user ou from 200.7.140.168 port 45056
2020-04-25T04:54:23.466355shield sshd\[20680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sisinfo2.unrc.edu.ar
2020-04-25T04:54:25.682500shield sshd\[20680\]: Failed password for invalid user ou from 200.7.140.168 port 45056 ssh2
2020-04-25T05:00:10.847146shield sshd\[22011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sisinfo2.unrc.edu.ar  user=root
2020-04-25T05:00:13.373416shield sshd\[22011\]: Failed password for root from 200.7.140.168 port 58934 ssh2
2020-04-25 13:08:32
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.7.140.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.7.140.168.			IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042401 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 13:08:29 CST 2020
;; MSG SIZE  rcvd: 117
Host info
168.140.7.200.in-addr.arpa domain name pointer sisinfo2.unrc.edu.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
168.140.7.200.in-addr.arpa	name = sisinfo2.unrc.edu.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.229.221.95 botsattackproxy
Vulnerability Scanner/illegal TCP ports in packet header
2024-06-24 21:19:46
138.117.4.226 attack
Vulnerability Scanner
2024-07-04 21:28:50
198.235.24.167 attack
Bad IP
2024-06-23 14:57:52
2001:0002:14:5:1:2:bf35:3610 botsattacknormal
Robo violáceo maltrato gttÿggfffffghjuixyxhhhh
2024-06-29 09:41:50
2001:0002:14:5:1:2:bf35:3610 botsattacknormal
2001:0002:14:5:1:2:bf35:3610
2024-06-29 09:42:12
43.202.68.252 attack
Fraud connect
2024-06-17 19:55:38
2001:0002:14:5:1:2:bf35:3610 botsattackproxynormal
Fgghg fue yffhjfdhuffghhggghggghhgghhyyyyhhhÿhhhu fi ghhhhhhhjjhhrjiuu
2024-06-29 09:49:52
90.84.247.121 attack
Fraud scan
2024-06-18 21:39:47
2001:0002:14:5:1:2:bf35:3610 botsattacknormal
Robo violáceo maltrato
2024-06-29 09:41:10
93.174.95.106 botsattackproxy
Botnet DB Scanner
2024-06-27 01:07:44
172.234.87.122 attack
Fraud connect
2024-06-25 12:40:38
62.204.41.246 attack
This ip is a hacker person chantajist
2024-06-16 10:58:42
104.152.52.242 attackproxy
Bot attacker IP
2024-06-25 12:37:07
46.101.92.185 attack
Fraud connect
2024-06-17 12:46:45
106.75.31.125 botsattackproxy
SSH bot
2024-06-18 21:44:49

Recently Reported IPs

117.86.139.235 96.93.196.89 190.218.217.253 117.86.10.229
88.88.90.179 190.64.137.173 195.136.61.93 184.170.209.177
114.119.166.102 194.28.144.209 77.42.93.192 111.126.93.152
122.51.112.238 93.79.102.220 92.49.90.247 217.112.142.180
114.231.110.34 191.177.155.212 190.0.22.34 37.35.9.77