This IP address has been reported a total of 54
times from 40 distinct
sources.
200.144.172.134 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
2024-08-22T15:37:37.475573+02:00 khatuna sshd[168146]: pam_unix(sshd:auth): authentication failure; ... show more2024-08-22T15:37:37.475573+02:00 khatuna sshd[168146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=root
2024-08-22T15:37:39.218362+02:00 khatuna sshd[168146]: Failed password for root from 200.144.172.134 port 33092 ssh2
2024-08-22T15:38:39.965847+02:00 khatuna sshd[168462]: Invalid user augusta from 200.144.172.134 port 50374
2024-08-22T15:38:39.969596+02:00 khatuna sshd[168462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
2024-08-22T15:38:41.892974+02:00 khatuna sshd[168462]: Failed password for invalid user augusta from 200.144.172.134 port 50374 ssh2
... show less
2024-08-22T14:37:29.526283+01:00 hostvu2 sshd[2763376]: pam_unix(sshd:auth): authentication failure; ... show more2024-08-22T14:37:29.526283+01:00 hostvu2 sshd[2763376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=root
2024-08-22T14:37:31.504107+01:00 hostvu2 sshd[2763376]: Failed password for root from 200.144.172.134 port 54592 ssh2
2024-08-22T14:38:32.065363+01:00 hostvu2 sshd[2763800]: Invalid user augusta from 200.144.172.134 port 43642
2024-08-22T14:38:32.067897+01:00 hostvu2 sshd[2763800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
2024-08-22T14:38:34.361688+01:00 hostvu2 sshd[2763800]: Failed password for invalid user augusta from 200.144.172.134 port 43642 ssh2
... show less
Aug 15 09:51:52 mt-view-website sshd[319426]: Invalid user hj from 200.144.172.134 port 50144
... show moreAug 15 09:51:52 mt-view-website sshd[319426]: Invalid user hj from 200.144.172.134 port 50144
Aug 15 09:51:52 mt-view-website sshd[319426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
Aug 15 09:51:54 mt-view-website sshd[319426]: Failed password for invalid user hj from 200.144.172.134 port 50144 ssh2
... show less
Aug 15 09:19:08 backup sshd[3042180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreAug 15 09:19:08 backup sshd[3042180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=root
Aug 15 09:19:10 backup sshd[3042180]: Failed password for root from 200.144.172.134 port 43588 ssh2
Aug 15 09:19:58 backup sshd[3042314]: Invalid user tecdoc from 200.144.172.134 port 56884
Aug 15 09:19:58 backup sshd[3042314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
Aug 15 09:19:59 backup sshd[3042314]: Failed password for invalid user tecdoc from 200.144.172.134 port 56884 ssh2
... show less
Aug 15 03:30:11 proliant-dl360-g7-1 sshd[64534]: Failed password for root from 200.144.172.134 port ... show moreAug 15 03:30:11 proliant-dl360-g7-1 sshd[64534]: Failed password for root from 200.144.172.134 port 49974 ssh2
Aug 15 03:31:03 proliant-dl360-g7-1 sshd[64551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=postgres
Aug 15 03:31:05 proliant-dl360-g7-1 sshd[64551]: Failed password for postgres from 200.144.172.134 port 35778 ssh2
Aug 15 03:31:53 proliant-dl360-g7-1 sshd[64558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=root
Aug 15 03:31:56 proliant-dl360-g7-1 sshd[64558]: Failed password for root from 200.144.172.134 port 49792 ssh2
... show less
Aug 15 00:50:08 b146-33 sshd[1977514]: Failed password for invalid user vah from 200.144.172.134 por ... show moreAug 15 00:50:08 b146-33 sshd[1977514]: Failed password for invalid user vah from 200.144.172.134 port 58462 ssh2
Aug 15 00:55:49 b146-33 sshd[1977854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134 user=root
Aug 15 00:55:51 b146-33 sshd[1977854]: Failed password for root from 200.144.172.134 port 46472 ssh2
... show less
Aug 15 06:55:14 dagasistemas sshd[29190]: Invalid user vah from 200.144.172.134 port 32940
Aug ... show moreAug 15 06:55:14 dagasistemas sshd[29190]: Invalid user vah from 200.144.172.134 port 32940
Aug 15 06:55:14 dagasistemas sshd[29190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
Aug 15 06:55:15 dagasistemas sshd[29190]: Failed password for invalid user vah from 200.144.172.134 port 32940 ssh2
... show less
Aug 15 07:50:56 vedantham-xyz sshd[699624]: Invalid user ansible from 200.144.172.134 port 34220<br ... show moreAug 15 07:50:56 vedantham-xyz sshd[699624]: Invalid user ansible from 200.144.172.134 port 34220
Aug 15 07:53:26 vedantham-xyz sshd[699695]: Invalid user sepp from 200.144.172.134 port 46868
Aug 15 07:54:17 vedantham-xyz sshd[699711]: Invalid user kvm from 200.144.172.134 port 60496
Aug 15 07:55:06 vedantham-xyz sshd[699738]: Invalid user dj from 200.144.172.134 port 45880
Aug 15 07:55:52 vedantham-xyz sshd[699758]: Invalid user gitserver from 200.144.172.134 port 59488
... show less
2024-08-15T04:54:27.382873marcelrobitaille sshd[11980]: Invalid user hadoop from 200.144.172.134 por ... show more2024-08-15T04:54:27.382873marcelrobitaille sshd[11980]: Invalid user hadoop from 200.144.172.134 port 36692
2024-08-15T04:56:27.632153marcelrobitaille sshd[12289]: Invalid user jira from 200.144.172.134 port 57106
2024-08-15T04:57:20.260335marcelrobitaille sshd[12359]: Invalid user lighthouse from 200.144.172.134 port 42730
... show less
(sshd) Failed SSH login from 200.144.172.134 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direc ... show more(sshd) Failed SSH login from 200.144.172.134 (BR/Brazil/-): 5 in the last 3600 secs; Ports: *; Direction: 1; Trigger: LF_SSHD; Logs: Aug 14 23:50:45 15068 sshd[14024]: Invalid user hadoop from 200.144.172.134 port 36962
Aug 14 23:50:47 15068 sshd[14024]: Failed password for invalid user hadoop from 200.144.172.134 port 36962 ssh2
Aug 14 23:56:06 15068 sshd[14432]: Invalid user jira from 200.144.172.134 port 50484
Aug 14 23:56:09 15068 sshd[14432]: Failed password for invalid user jira from 200.144.172.134 port 50484 ssh2
Aug 14 23:56:59 15068 sshd[14449]: Invalid user lighthouse from 200.144.172.134 port 36108 show less
2024-08-15T06:53:34.093205+02:00 GTS1 sshd[819743]: pam_unix(sshd:auth): authentication failure; log ... show more2024-08-15T06:53:34.093205+02:00 GTS1 sshd[819743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.144.172.134
2024-08-15T06:53:35.753326+02:00 GTS1 sshd[819743]: Failed password for invalid user hadoop from 200.144.172.134 port 49466 ssh2
2024-08-15T06:56:22.903958+02:00 GTS1 sshd[819924]: Invalid user jira from 200.144.172.134 port 46840
... show less