This IP address has been reported a total of 1,948
times from 648 distinct
sources.
200.7.102.138 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2025-02-08T06:03:47.629930+00:00 bcq-pro sshd[2841244]: Invalid user test1 from 200.7.102.138 port 3 ... show more2025-02-08T06:03:47.629930+00:00 bcq-pro sshd[2841244]: Invalid user test1 from 200.7.102.138 port 34982
2025-02-08T06:07:19.083800+00:00 bcq-pro sshd[2875496]: Invalid user ftpuser from 200.7.102.138 port 56272
2025-02-08T06:08:36.999673+00:00 bcq-pro sshd[2876089]: Invalid user ubuntu from 200.7.102.138 port 44806
... show less
2025-02-08T06:02:41.749063+00:00 edge-fog-fra01.int.pdx.net.uk sshd[2592853]: Invalid user test1 fro ... show more2025-02-08T06:02:41.749063+00:00 edge-fog-fra01.int.pdx.net.uk sshd[2592853]: Invalid user test1 from 200.7.102.138 port 60824
2025-02-08T06:07:03.460376+00:00 edge-fog-fra01.int.pdx.net.uk sshd[2593828]: Invalid user ftpuser from 200.7.102.138 port 38334
2025-02-08T06:08:22.181213+00:00 edge-fog-fra01.int.pdx.net.uk sshd[2594119]: Invalid user ubuntu from 200.7.102.138 port 45012
... show less
Feb 7 23:02:15 b146-27 sshd[426618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreFeb 7 23:02:15 b146-27 sshd[426618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138
Feb 7 23:02:17 b146-27 sshd[426618]: Failed password for invalid user test1 from 200.7.102.138 port 43786 ssh2
Feb 7 23:06:56 b146-27 sshd[426853]: Invalid user ftpuser from 200.7.102.138 port 39678
... show less
Feb 8 04:39:57 ubuntu sshd[1580282]: Failed password for root from 200.7.102.138 port 50356 ssh2<br ... show moreFeb 8 04:39:57 ubuntu sshd[1580282]: Failed password for root from 200.7.102.138 port 50356 ssh2
Feb 8 04:41:14 ubuntu sshd[1580284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
Feb 8 04:41:16 ubuntu sshd[1580284]: Failed password for root from 200.7.102.138 port 48450 ssh2
... show less
2025-02-08T07:28:55.554596pantelemone.ru sshd[2580189]: Failed password for root from 200.7.102.138 ... show more2025-02-08T07:28:55.554596pantelemone.ru sshd[2580189]: Failed password for root from 200.7.102.138 port 59908 ssh2
2025-02-08T07:30:13.955136pantelemone.ru sshd[2580454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T07:30:16.040039pantelemone.ru sshd[2580454]: Failed password for root from 200.7.102.138 port 42234 ssh2
2025-02-08T07:31:37.115808pantelemone.ru sshd[2580565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T07:31:39.733031pantelemone.ru sshd[2580565]: Failed password for root from 200.7.102.138 port 53882 ssh2
... show less
2025-02-08T07:13:30.476590pantelemone.ru sshd[2578104]: Failed password for root from 200.7.102.138 ... show more2025-02-08T07:13:30.476590pantelemone.ru sshd[2578104]: Failed password for root from 200.7.102.138 port 59658 ssh2
2025-02-08T07:14:44.844056pantelemone.ru sshd[2578220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T07:14:46.727691pantelemone.ru sshd[2578220]: Failed password for root from 200.7.102.138 port 59424 ssh2
2025-02-08T07:16:03.033681pantelemone.ru sshd[2578526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T07:16:04.761849pantelemone.ru sshd[2578526]: Failed password for root from 200.7.102.138 port 54048 ssh2
... show less
2025-02-08T06:58:07.519736pantelemone.ru sshd[2575356]: Failed password for root from 200.7.102.138 ... show more2025-02-08T06:58:07.519736pantelemone.ru sshd[2575356]: Failed password for root from 200.7.102.138 port 57116 ssh2
2025-02-08T06:59:25.986324pantelemone.ru sshd[2575460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T06:59:28.371780pantelemone.ru sshd[2575460]: Failed password for root from 200.7.102.138 port 46476 ssh2
2025-02-08T07:00:45.929884pantelemone.ru sshd[2576224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
2025-02-08T07:00:48.296801pantelemone.ru sshd[2576224]: Failed password for root from 200.7.102.138 port 54508 ssh2
... show less
Feb 7 20:56:43 b146-13 sshd[421729]: Failed password for root from 200.7.102.138 port 56912 ssh2<br ... show moreFeb 7 20:56:43 b146-13 sshd[421729]: Failed password for root from 200.7.102.138 port 56912 ssh2
Feb 7 20:58:04 b146-13 sshd[421827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
Feb 7 20:58:06 b146-13 sshd[421827]: Failed password for root from 200.7.102.138 port 59276 ssh2
... show less
Brute-ForceSSH
Anonymous
Feb 8 03:52:06 f2b auth.info sshd[356838]: Failed password for root from 200.7.102.138 port 47770 s ... show moreFeb 8 03:52:06 f2b auth.info sshd[356838]: Failed password for root from 200.7.102.138 port 47770 ssh2
Feb 8 03:56:07 f2b auth.info sshd[356852]: Failed password for root from 200.7.102.138 port 58646 ssh2
Feb 8 03:57:29 f2b auth.info sshd[356856]: Failed password for root from 200.7.102.138 port 50536 ssh2
... show less
2025-02-08T02:42:40.403616+01:00 nc2.motyka.pro sshd[1181725]: Failed password for root from 200.7.1 ... show more2025-02-08T02:42:40.403616+01:00 nc2.motyka.pro sshd[1181725]: Failed password for root from 200.7.102.138 port 53162 ssh2
2025-02-08T02:44:59.736812+01:00 nc2.motyka.pro sshd[1187669]: Failed password for root from 200.7.102.138 port 51106 ssh2
2025-02-08T02:46:23.164486+01:00 nc2.motyka.pro sshd[1191237]: Failed password for root from 200.7.102.138 port 39976 ssh2
2025-02-08T02:48:08.564038+01:00 nc2.motyka.pro sshd[1196040]: Failed password for root from 200.7.102.138 port 44932 ssh2
2025-02-08T02:49:26.146693+01:00 nc2.motyka.pro sshd[1199248]: Failed password for root from 200.7.102.138 port 48226 ssh2
... show less
200.7.102.138 (200-7-102-138.static.hostdime.com) - SSH Brute force:
Feb 8 04:44:29 XWEB sshd ... show more200.7.102.138 (200-7-102-138.static.hostdime.com) - SSH Brute force:
Feb 8 04:44:29 XWEB sshd[3945]: Failed password for root from 200.7.102.138 port 54320 ssh2
Feb 8 04:45:52 XWEB sshd[3960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.7.102.138 user=root
Feb 8 04:45:54 XWEB sshd[3960]: Failed password for root from 200.7.102.138 port 38176 ssh2
... show less
2025-02-08T02:12:35.469191+02:00 kiv01.hacktegic.com sshd-session[169899]: Disconnected from authent ... show more2025-02-08T02:12:35.469191+02:00 kiv01.hacktegic.com sshd-session[169899]: Disconnected from authenticating user root 200.7.102.138 port 33564 [preauth]
2025-02-08T02:15:02.721432+02:00 kiv01.hacktegic.com sshd-session[170266]: Disconnected from authenticating user root 200.7.102.138 port 60770 [preauth]
2025-02-08T02:16:23.278021+02:00 kiv01.hacktegic.com sshd-session[170477]: Disconnected from authenticating user root 200.7.102.138 port 58798 [preauth]
... show less