AbuseIPDB » 200.131.242.2
Enter an IP Address, Domain Name, or Subnet:
e.g. 34.225.194.144, microsoft.com, or 5.188.10.0/24
200.131.242.2 was found in our database!
This IP was reported 678 times. Confidence of Abuse is 81%: ?
81%
ISP | Associacao Rede Nacional de Ensino e Pesquisa |
---|---|
Usage Type | Fixed Line ISP |
Domain Name | rnp.br |
Country |
![]() |
City | Rio de Janeiro, Rio de Janeiro |
Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.
IP Abuse Reports for 200.131.242.2:
This IP address has been reported a total of 678 times from 89 distinct sources. 200.131.242.2 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | Date | Comment | Categories | |
---|---|---|---|---|
![]() |
Oct 22 12:44:57 ip-172-31-1-72 sshd\[2751\]: pam_unix\(sshd:auth\): authentication failure\; logname ... show moreOct 22 12:44:57 ip-172-31-1-72 sshd\[2751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 12:44:59 ip-172-31-1-72 sshd\[2751\]: Failed password for root from 200.131.242.2 port 38549 ssh2 Oct 22 12:49:35 ip-172-31-1-72 sshd\[2802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 12:49:37 ip-172-31-1-72 sshd\[2802\]: Failed password for root from 200.131.242.2 port 35229 ssh2 Oct 22 12:54:12 ip-172-31-1-72 sshd\[2864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root show less |
Brute-Force SSH | ||
workmarket.eu |
Oct 22 14:46:09 localhost sshd\[18207\]: pam_unix\(sshd:auth\): authentication failure\; logname= ui ... show moreOct 22 14:46:09 localhost sshd\[18207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 14:46:11 localhost sshd\[18207\]: Failed password for root from 200.131.242.2 port 56178 ssh2 Oct 22 14:50:49 localhost sshd\[18624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root show less |
Brute-Force SSH | ||
workmarket.eu |
Oct 22 14:23:39 localhost sshd\[15847\]: Invalid user user2 from 200.131.242.2 port 30034
Oct ... show moreOct 22 14:23:39 localhost sshd\[15847\]: Invalid user user2 from 200.131.242.2 port 30034
Oct 22 14:23:39 localhost sshd\[15847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 14:23:41 localhost sshd\[15847\]: Failed password for invalid user user2 from 200.131.242.2 port 30034 ssh2 show less |
Brute-Force SSH | ||
workmarket.eu |
Oct 22 14:01:33 localhost sshd\[13592\]: Invalid user cz from 200.131.242.2 port 16453
Oct 22 ... show moreOct 22 14:01:33 localhost sshd\[13592\]: Invalid user cz from 200.131.242.2 port 16453
Oct 22 14:01:33 localhost sshd\[13592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 14:01:35 localhost sshd\[13592\]: Failed password for invalid user cz from 200.131.242.2 port 16453 ssh2 show less |
Brute-Force SSH | ||
![]() |
Oct 22 11:36:18 ip-172-31-1-72 sshd\[1428\]: Invalid user wp from 200.131.242.2
Oct 22 11:36:1 ... show moreOct 22 11:36:18 ip-172-31-1-72 sshd\[1428\]: Invalid user wp from 200.131.242.2
Oct 22 11:36:18 ip-172-31-1-72 sshd\[1428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 11:36:21 ip-172-31-1-72 sshd\[1428\]: Failed password for invalid user wp from 200.131.242.2 port 35884 ssh2 Oct 22 11:40:46 ip-172-31-1-72 sshd\[1608\]: Invalid user test from 200.131.242.2 Oct 22 11:40:46 ip-172-31-1-72 sshd\[1608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 show less |
Brute-Force SSH | ||
workmarket.eu |
Oct 22 13:37:27 localhost sshd\[11200\]: Invalid user wp from 200.131.242.2 port 50963
Oct 22 ... show moreOct 22 13:37:27 localhost sshd\[11200\]: Invalid user wp from 200.131.242.2 port 50963
Oct 22 13:37:27 localhost sshd\[11200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 13:37:29 localhost sshd\[11200\]: Failed password for invalid user wp from 200.131.242.2 port 50963 ssh2 show less |
Brute-Force SSH | ||
Anonymous |
Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2
Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 03:54:19 microserver sshd[50560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:54:21 microserver sshd[50560]: Failed password for root from 200.131.242.2 port 30021 ssh2 Oct 22 04:07:02 microserver sshd[52489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 04:07:04 microserver sshd[52489]: Failed password for root from 200.131.242.2 port 34424 ssh2 Oct 22 04:11:19 microserver sshd[53083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 04:11:22 microserver sshd[53083]: Failed password for root from 200.131.242.2 port 34245 ssh show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 ... show moreOct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2
Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 03:54:19 microserver sshd[50560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force | ||
Anonymous |
Oct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 ... show moreOct 22 03:28:40 microserver sshd[47198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root
Oct 22 03:28:41 microserver sshd[47198]: Failed password for root from 200.131.242.2 port 63438 ssh2 Oct 22 03:32:58 microserver sshd[47818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:33:00 microserver sshd[47818]: Failed password for root from 200.131.242.2 port 39573 ssh2 Oct 22 03:37:22 microserver sshd[48485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 user=root Oct 22 03:50:01 microserver sshd[49951]: Invalid user cyrusimap from 200.131.242.2 port 7364 Oct 22 03:50:01 microserver sshd[49951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.131.242.2 Oct 22 03:50:03 microserver sshd[49951]: Failed password for invalid user cyrusimap from 200.131.242.2 port 7364 ssh2 Oct 22 show less |
Brute-Force |
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.
Recently Reported IPs:
Removal Request Form
Factors that determine the decision of this removal request:
- Your client IP address
- Your domain IP address (if any)
- Your previous removal requests
- Previous removal requests of this IP
- Your account's trustworthiness weight
- The number of reports on this IP, as well as their respective weights