This IP address has been reported a total of 168
times from 92 distinct
sources.
89.47.200.242 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Report 1449537 with IP 2497087 for SSH brute-force attack by source 2491762 via ssh-honeypot/0.2.0+h ... show moreReport 1449537 with IP 2497087 for SSH brute-force attack by source 2491762 via ssh-honeypot/0.2.0+http show less
Nov 15 07:36:10 eltis-prod-1 sshd[472583]: Invalid user user from 89.47.200.242 port 44922
Nov ... show moreNov 15 07:36:10 eltis-prod-1 sshd[472583]: Invalid user user from 89.47.200.242 port 44922
Nov 15 07:36:19 eltis-prod-1 sshd[472622]: Invalid user user from 89.47.200.242 port 48834
Nov 15 07:36:27 eltis-prod-1 sshd[472651]: Invalid user user from 89.47.200.242 port 42866
Nov 15 07:36:35 eltis-prod-1 sshd[472672]: Invalid user user from 89.47.200.242 port 42874
Nov 15 07:36:44 eltis-prod-1 sshd[472695]: Invalid user user from 89.47.200.242 port 38140
... show less
2024-11-14T19:08:46.443680-08:00 RoblOcean sshd-session[123662]: Invalid user user from 89.47.200.24 ... show more2024-11-14T19:08:46.443680-08:00 RoblOcean sshd-session[123662]: Invalid user user from 89.47.200.242 port 46980
2024-11-14T19:08:48.016206-08:00 RoblOcean sshd-session[123664]: Invalid user user from 89.47.200.242 port 46996
2024-11-14T19:08:49.466766-08:00 RoblOcean sshd-session[123666]: Invalid user user from 89.47.200.242 port 47000
2024-11-14T19:08:50.954665-08:00 RoblOcean sshd-session[123668]: Invalid user user from 89.47.200.242 port 47008
2024-11-14T19:08:52.482775-08:00 RoblOcean sshd-session[123670]: Invalid user user from 89.47.200.242 port 36180
... show less
2024-11-15T04:02:08.783218+01:00 secure sshd[20144]: User root from 89.47.200.242 not allowed becaus ... show more2024-11-15T04:02:08.783218+01:00 secure sshd[20144]: User root from 89.47.200.242 not allowed because not listed in AllowUsers
2024-11-15T04:02:09.479696+01:00 secure sshd[20146]: User root from 89.47.200.242 not allowed because not listed in AllowUsers
2024-11-15T04:02:10.179988+01:00 secure sshd[20148]: User root from 89.47.200.242 not allowed because not listed in AllowUsers
... show less
Nov 14 00:39:24 MedellinCityRPS1 sshd[177073]: Failed password for root from 89.47.200.242 port 5428 ... show moreNov 14 00:39:24 MedellinCityRPS1 sshd[177073]: Failed password for root from 89.47.200.242 port 54282 ssh2
Nov 14 00:39:25 MedellinCityRPS1 sshd[177079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.47.200.242 user=root
Nov 14 00:39:27 MedellinCityRPS1 sshd[177079]: Failed password for root from 89.47.200.242 port 54284 ssh2
Nov 14 00:39:30 MedellinCityRPS1 sshd[177084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.47.200.242 user=root
Nov 14 00:39:31 MedellinCityRPS1 sshd[177084]: Failed password for root from 89.47.200.242 port 49908 ssh2
Nov 14 00:39:35 MedellinCityRPS1 sshd[177090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.47.200.242 user=root
Nov 14 00:39:37 MedellinCityRPS1 sshd[177090]: Failed password for root from 89.47.200.242 port 49922 ssh2
... show less