Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cúcuta

Region: Norte de Santander

Country: Colombia

Internet Service Provider: eTb

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
200.93.148.19 attack
Jan  1 15:54:07 vps647732 sshd[16847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
Jan  1 15:54:09 vps647732 sshd[16847]: Failed password for invalid user mickey from 200.93.148.19 port 46180 ssh2
...
2020-01-01 23:20:58
200.93.148.19 attack
Dec 19 23:26:37 loxhost sshd\[31609\]: Invalid user trinity from 200.93.148.19 port 48332
Dec 19 23:26:37 loxhost sshd\[31609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
Dec 19 23:26:38 loxhost sshd\[31609\]: Failed password for invalid user trinity from 200.93.148.19 port 48332 ssh2
Dec 19 23:34:51 loxhost sshd\[31961\]: Invalid user vanaken from 200.93.148.19 port 58433
Dec 19 23:34:51 loxhost sshd\[31961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
...
2019-12-20 07:46:04
200.93.148.19 attackspambots
Nov 28 09:58:06 ns382633 sshd\[28764\]: Invalid user info from 200.93.148.19 port 34224
Nov 28 09:58:06 ns382633 sshd\[28764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
Nov 28 09:58:08 ns382633 sshd\[28764\]: Failed password for invalid user info from 200.93.148.19 port 34224 ssh2
Nov 28 10:26:21 ns382633 sshd\[1746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19  user=root
Nov 28 10:26:23 ns382633 sshd\[1746\]: Failed password for root from 200.93.148.19 port 43994 ssh2
2019-11-28 20:08:25
200.93.148.19 attackspambots
Nov 17 18:11:02 andromeda sshd\[4917\]: Invalid user mengister from 200.93.148.19 port 38785
Nov 17 18:11:02 andromeda sshd\[4917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
Nov 17 18:11:04 andromeda sshd\[4917\]: Failed password for invalid user mengister from 200.93.148.19 port 38785 ssh2
2019-11-18 01:28:55
200.93.148.19 attackspambots
2019-11-16T08:45:10.555614tmaserv sshd\[10322\]: Invalid user vcsa from 200.93.148.19 port 46455
2019-11-16T08:45:10.560382tmaserv sshd\[10322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
2019-11-16T08:45:12.640627tmaserv sshd\[10322\]: Failed password for invalid user vcsa from 200.93.148.19 port 46455 ssh2
2019-11-16T09:17:36.710780tmaserv sshd\[12140\]: Invalid user admin from 200.93.148.19 port 37023
2019-11-16T09:17:36.715080tmaserv sshd\[12140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
2019-11-16T09:17:38.951514tmaserv sshd\[12140\]: Failed password for invalid user admin from 200.93.148.19 port 37023 ssh2
...
2019-11-16 15:54:33
200.93.148.19 attack
Nov 15 07:29:27 vmanager6029 sshd\[13713\]: Invalid user marchi from 200.93.148.19 port 43169
Nov 15 07:29:27 vmanager6029 sshd\[13713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.93.148.19
Nov 15 07:29:29 vmanager6029 sshd\[13713\]: Failed password for invalid user marchi from 200.93.148.19 port 43169 ssh2
2019-11-15 15:43:47
200.93.148.19 attackbotsspam
frenzy
2019-11-14 03:06:18
200.93.148.19 attackbotsspam
2019-11-02T05:19:39.919851abusebot-8.cloudsearch.cf sshd\[5866\]: Invalid user test from 200.93.148.19 port 56254
2019-11-02 13:29:03
200.93.148.19 attackbots
Aug 18 04:00:24 XXX sshd[1371]: Invalid user bcampion from 200.93.148.19 port 55721
2019-08-18 20:49:35
200.93.148.19 attackbots
SSH Brute Force, server-1 sshd[31833]: Failed password for invalid user git from 200.93.148.19 port 54077 ssh2
2019-08-14 15:00:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.93.148.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1018
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.93.148.18.			IN	A

;; AUTHORITY SECTION:
.			453	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092601 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 27 14:34:46 CST 2022
;; MSG SIZE  rcvd: 106
Host info
18.148.93.200.in-addr.arpa domain name pointer corporativo493148-18.ufps.edu.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.148.93.200.in-addr.arpa	name = corporativo493148-18.ufps.edu.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.79.179.2 attack
Dec 17 05:09:49 web1 sshd\[25305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.79.179.2  user=root
Dec 17 05:09:52 web1 sshd\[25305\]: Failed password for root from 80.79.179.2 port 45128 ssh2
Dec 17 05:15:34 web1 sshd\[25926\]: Invalid user alberto from 80.79.179.2
Dec 17 05:15:34 web1 sshd\[25926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.79.179.2
Dec 17 05:15:36 web1 sshd\[25926\]: Failed password for invalid user alberto from 80.79.179.2 port 53344 ssh2
2019-12-17 23:28:48
45.55.224.209 attackbots
Dec 17 16:27:44 meumeu sshd[13070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 
Dec 17 16:27:46 meumeu sshd[13070]: Failed password for invalid user ftpuser from 45.55.224.209 port 48854 ssh2
Dec 17 16:33:26 meumeu sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.224.209 
...
2019-12-17 23:41:43
146.247.37.39 attack
Unauthorized connection attempt detected from IP address 146.247.37.39 to port 445
2019-12-17 23:49:16
124.116.188.142 attackbots
Dec 17 15:15:59 MK-Soft-VM5 sshd[31921]: Failed password for root from 124.116.188.142 port 55909 ssh2
...
2019-12-17 23:32:00
80.211.40.182 attackspam
2019-12-17T15:33:47.343780abusebot-6.cloudsearch.cf sshd\[8413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.40.182  user=root
2019-12-17T15:33:49.624246abusebot-6.cloudsearch.cf sshd\[8413\]: Failed password for root from 80.211.40.182 port 48166 ssh2
2019-12-17T15:33:50.700372abusebot-6.cloudsearch.cf sshd\[8415\]: Invalid user admin from 80.211.40.182 port 53140
2019-12-17T15:33:50.707005abusebot-6.cloudsearch.cf sshd\[8415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.40.182
2019-12-17 23:50:00
188.165.238.65 attackbots
Dec 17 16:24:35 loxhost sshd\[9118\]: Invalid user Sweet2017 from 188.165.238.65 port 40744
Dec 17 16:24:35 loxhost sshd\[9118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.238.65
Dec 17 16:24:37 loxhost sshd\[9118\]: Failed password for invalid user Sweet2017 from 188.165.238.65 port 40744 ssh2
Dec 17 16:29:52 loxhost sshd\[9296\]: Invalid user liebner from 188.165.238.65 port 50838
Dec 17 16:29:52 loxhost sshd\[9296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.238.65
...
2019-12-17 23:47:06
96.78.177.242 attackspam
Dec 17 16:15:34 ns381471 sshd[30197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.78.177.242
Dec 17 16:15:36 ns381471 sshd[30197]: Failed password for invalid user asif from 96.78.177.242 port 33316 ssh2
2019-12-17 23:28:16
218.92.0.165 attackbotsspam
Dec 17 16:26:53 sip sshd[27474]: Failed password for root from 218.92.0.165 port 38641 ssh2
Dec 17 16:27:06 sip sshd[27474]: Failed password for root from 218.92.0.165 port 38641 ssh2
Dec 17 16:27:06 sip sshd[27474]: error: maximum authentication attempts exceeded for root from 218.92.0.165 port 38641 ssh2 [preauth]
2019-12-17 23:42:04
40.92.11.56 attackbotsspam
Dec 17 17:25:44 debian-2gb-vpn-nbg1-1 kernel: [971110.976149] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.11.56 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=232 ID=43740 DF PROTO=TCP SPT=49376 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-17 23:40:02
222.186.175.140 attackbotsspam
Dec 17 16:45:52 sd-53420 sshd\[28842\]: User root from 222.186.175.140 not allowed because none of user's groups are listed in AllowGroups
Dec 17 16:45:52 sd-53420 sshd\[28842\]: Failed none for invalid user root from 222.186.175.140 port 39878 ssh2
Dec 17 16:45:52 sd-53420 sshd\[28842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
Dec 17 16:45:54 sd-53420 sshd\[28842\]: Failed password for invalid user root from 222.186.175.140 port 39878 ssh2
Dec 17 16:45:57 sd-53420 sshd\[28842\]: Failed password for invalid user root from 222.186.175.140 port 39878 ssh2
...
2019-12-17 23:47:31
54.37.154.113 attackbots
Dec 17 14:44:05 zeus sshd[26115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113 
Dec 17 14:44:07 zeus sshd[26115]: Failed password for invalid user rivedal from 54.37.154.113 port 42154 ssh2
Dec 17 14:49:22 zeus sshd[26257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.154.113 
Dec 17 14:49:25 zeus sshd[26257]: Failed password for invalid user fambrough from 54.37.154.113 port 49366 ssh2
2019-12-17 23:39:29
103.36.84.100 attack
Dec 17 16:19:34 vps691689 sshd[6826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.36.84.100
Dec 17 16:19:36 vps691689 sshd[6826]: Failed password for invalid user groce from 103.36.84.100 port 36650 ssh2
...
2019-12-17 23:27:43
95.254.192.19 attack
port scan and connect, tcp 23 (telnet)
2019-12-17 23:54:12
14.171.55.152 attackbotsspam
1576592743 - 12/17/2019 15:25:43 Host: 14.171.55.152/14.171.55.152 Port: 445 TCP Blocked
2019-12-17 23:40:18
191.17.20.11 attackspam
Dec 17 15:25:50 debian-2gb-nbg1-2 kernel: \[245529.487064\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=191.17.20.11 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=44907 DF PROTO=TCP SPT=14542 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0
2019-12-17 23:29:42

Recently Reported IPs

161.35.208.13 202.153.210.76 186.38.98.199 132.192.224.105
22.90.251.117 189.34.199.59 14.90.37.103 2.22.246.227
239.174.33.64 163.99.70.152 0.127.53.139 0.214.20.148
0.133.220.242 0.207.198.133 0.216.49.99 0.207.200.12
0.125.59.131 0.205.15.114 0.220.67.70 0.217.159.110