Go
200.146.215.26
is a
Hacker
100 %
Brazil
Report Abuse
156attacks reported
108Brute-ForceSSH
18Brute-Force
11SSH
9Port ScanHacking
6uncategorized
1Brute-ForceExploited HostSSH
1DDoS AttackSSH
1FTP Brute-ForceHacking
1Bad Web Bot
1abuse reported
1Bad Web BotExploited Host
from 66 distinct reporters
and 7 distinct sources : BadIPs.com, Blocklist.de, darklist.de, FireHOL, GreenSnow.co, Charles Haley, AbuseIPDB
200.146.215.26 was first signaled at 2020-01-14 02:33 and last record was at 2020-08-04 13:51.
IP

200.146.215.26

Organization
ALGAR TELECOM S/A
Localisation
Brazil
Sao Paulo, Sao Paulo
NetRange : First & Last IP
200.146.215.0 - 200.146.215.127
Network CIDR
200.146.215.0/25

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2020-08-04 13:51 attacks SSH AbuseIPDB Aug 4 23:51:19 gospond sshd[17000]: Failed password for root from 200.146.215.26 port 11830 ssh2 Aug 4 23:51:17 gospond sshd[17000]: pam_unix(sshd:aut
2020-08-04 12:52 attacks Brute-ForceSSH AbuseIPDB 2020-08-04T23:43:36.723469mail.broermann.family sshd[20126]: Failed password for root from 200.146.215.26 port 10699 ssh2 2020-08-04T23:48:17.943278ma
2020-08-04 12:45 attacks SSH AbuseIPDB Aug 4 22:41:06 gospond sshd[15377]: Failed password for root from 200.146.215.26 port 17595 ssh2 Aug 4 22:45:48 gospond sshd[15469]: pam_unix(sshd:aut
2020-08-04 12:45 attacks Brute-ForceSSH AbuseIPDB  
2020-08-04 09:42 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Forcing (server1)
2020-08-04 09:27 attacks Brute-ForceSSH AbuseIPDB SSH bruteforce
2020-08-04 00:52 attacks Brute-ForceSSH AbuseIPDB fail2ban detected brute force on sshd
2020-08-03 22:44 attacks Brute-ForceExploited HostSSH AbuseIPDB reported through recidive - multiple failed attempts(SSH)
2020-08-03 21:50 attacks Brute-Force AbuseIPDB 2020-08-04 01:49:45.960381-0500 localhost sshd[47532]: Failed password for root from 200.146.215.26 port 60507 ssh2
2020-08-03 19:50 attacks Brute-ForceSSH AbuseIPDB Aug 4 07:40:50 lukav-desktop sshd\[15277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26
2020-08-03 18:39 attacks Brute-ForceSSH AbuseIPDB Aug 4 06:29:35 lukav-desktop sshd\[13159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26
2020-08-03 18:21 attacks Brute-ForceSSH AbuseIPDB 200.146.215.26 (BR/Brazil/200-146-215-026.static.ctbctelecom.com.br), 12 distributed sshd attacks on account [root] in the last 3600 secs
2020-08-03 17:57 attacks Brute-ForceSSH AbuseIPDB Aug 4 04:52:42 buvik sshd[16975]: Failed password for root from 200.146.215.26 port 47308 ssh2 Aug 4 04:57:36 buvik sshd[17658]: pam_unix(sshd:auth):
2020-08-03 17:33 attacks Brute-ForceSSH AbuseIPDB Aug 4 04:28:03 buvik sshd[13681]: Failed password for root from 200.146.215.26 port 35042 ssh2 Aug 4 04:32:57 buvik sshd[14353]: pam_unix(sshd:auth):
2020-08-03 17:08 attacks Brute-ForceSSH AbuseIPDB Aug 4 04:03:10 buvik sshd[9865]: Failed password for root from 200.146.215.26 port 58282 ssh2 Aug 4 04:08:14 buvik sshd[10508]: pam_unix(sshd:auth): a
2020-08-03 16:55 attacks Brute-ForceSSH AbuseIPDB Repeated brute force against a port
2020-08-03 16:47 attacks Brute-ForceSSH AbuseIPDB Aug 4 03:42:12 buvik sshd[6648]: Failed password for root from 200.146.215.26 port 17284 ssh2 Aug 4 03:46:59 buvik sshd[7281]: pam_unix(sshd:auth): au
2020-08-03 16:22 attacks Brute-ForceSSH AbuseIPDB Aug 4 03:17:51 buvik sshd[3394]: Failed password for root from 200.146.215.26 port 53507 ssh2 Aug 4 03:22:36 buvik sshd[3961]: pam_unix(sshd:auth): au
2020-08-03 15:59 attacks Brute-ForceSSH AbuseIPDB Aug 4 02:54:28 buvik sshd[32050]: Failed password for root from 200.146.215.26 port 50925 ssh2 Aug 4 02:59:06 buvik sshd[32747]: pam_unix(sshd:auth):
2020-08-03 12:03 attacks Brute-ForceSSH AbuseIPDB Aug 3 21:59:44 rocket sshd[744]: Failed password for root from 200.146.215.26 port 59101 ssh2 Aug 3 22:03:49 rocket sshd[1574]: Failed password for ro
2020-08-03 11:47 attacks Brute-ForceSSH AbuseIPDB Aug 3 21:43:06 rocket sshd[30425]: Failed password for root from 200.146.215.26 port 40962 ssh2 Aug 3 21:47:18 rocket sshd[31242]: Failed password for
2020-08-03 11:30 attacks Brute-ForceSSH AbuseIPDB Aug 3 21:26:58 rocket sshd[27658]: Failed password for root from 200.146.215.26 port 47903 ssh2 Aug 3 21:30:57 rocket sshd[28324]: Failed password for
2020-08-03 11:14 attacks Brute-ForceSSH AbuseIPDB Aug 3 21:10:54 rocket sshd[25046]: Failed password for root from 200.146.215.26 port 47581 ssh2 Aug 3 21:14:53 rocket sshd[25557]: Failed password for
2020-08-03 10:58 attacks Brute-ForceSSH AbuseIPDB Aug 3 20:54:34 rocket sshd[22170]: Failed password for root from 200.146.215.26 port 33410 ssh2 Aug 3 20:58:39 rocket sshd[22876]: Failed password for
2020-08-03 10:25 attacks Brute-ForceSSH AbuseIPDB Aug 3 20:21:38 rocket sshd[17020]: Failed password for root from 200.146.215.26 port 29793 ssh2 Aug 3 20:25:57 rocket sshd[17710]: Failed password for
2020-08-03 10:08 attacks Brute-ForceSSH AbuseIPDB Aug 3 20:04:41 rocket sshd[14181]: Failed password for root from 200.146.215.26 port 28592 ssh2 Aug 3 20:08:59 rocket sshd[14868]: Failed password for
2020-08-03 09:51 attacks Brute-ForceSSH AbuseIPDB Aug 3 19:47:45 rocket sshd[11777]: Failed password for root from 200.146.215.26 port 26741 ssh2 Aug 3 19:51:57 rocket sshd[12437]: Failed password for
2020-08-03 09:35 attacks Brute-ForceSSH AbuseIPDB Aug 3 19:25:49 rocket sshd[8544]: Failed password for root from 200.146.215.26 port 51834 ssh2 Aug 3 19:35:01 rocket sshd[9696]: Failed password for r
2020-08-02 22:41 attacks Brute-ForceSSH AbuseIPDB  
2020-08-02 21:26 attacks Brute-ForceSSH AbuseIPDB  
2020-08-02 20:42 attacks Brute-ForceSSH AbuseIPDB Aug 3 07:41:43 lnxded64 sshd[29109]: Failed password for root from 200.146.215.26 port 42950 ssh2 Aug 3 07:41:43 lnxded64 sshd[29109]: Failed password
2020-08-02 20:17 attacks Brute-ForceSSH AbuseIPDB Aug 3 07:12:06 lnxded64 sshd[21335]: Failed password for root from 200.146.215.26 port 45371 ssh2 Aug 3 07:12:06 lnxded64 sshd[21335]: Failed password
2020-08-02 19:57 attacks Brute-ForceSSH AbuseIPDB Aug 3 06:47:18 lnxded64 sshd[14549]: Failed password for root from 200.146.215.26 port 22704 ssh2 Aug 3 06:52:19 lnxded64 sshd[15631]: Failed password
2020-08-02 19:50 attacks Brute-ForceSSH AbuseIPDB Aug 3 01:43:24 ws12vmsma01 sshd[26218]: Failed password for root from 200.146.215.26 port 14003 ssh2 Aug 3 01:48:20 ws12vmsma01 sshd[26939]: pam_unix(
2020-08-02 11:33 attacks Brute-ForceSSH AbuseIPDB Failed password for root from 200.146.215.26 port 9826 ssh2
2020-08-02 02:48 attacks Brute-ForceSSH AbuseIPDB 2020-08-02T13:43:13.050016centos sshd[17374]: Failed password for root from 200.146.215.26 port 22655 ssh2 2020-08-02T13:48:03.524419centos sshd[17604
2020-08-01 18:32 attacks Brute-ForceSSH AbuseIPDB Aug 2 03:25:06 vlre-nyc-1 sshd\[14239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26 use
2020-08-01 18:16 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-08-01 12:48 attacks Brute-ForceSSH AbuseIPDB Fail2Ban
2020-08-01 12:14 attacks Brute-ForceSSH AbuseIPDB Aug 1 21:14:08 *** sshd[30363]: User root from 200.146.215.26 not allowed because not listed in AllowUsers
2020-08-01 05:34 attacks Brute-ForceSSH AbuseIPDB 2020-08-01T14:31:29.086303vps1033 sshd[4925]: Failed password for root from 200.146.215.26 port 38399 ssh2 2020-08-01T14:32:51.664293vps1033 sshd[7840
2020-08-01 04:27 attacks Brute-ForceSSH AbuseIPDB 2020-08-01T13:25:02.147161vps1033 sshd[26482]: Failed password for root from 200.146.215.26 port 52654 ssh2 2020-08-01T13:26:27.171788vps1033 sshd[296
2020-08-01 03:21 attacks Brute-ForceSSH AbuseIPDB 2020-08-01T12:18:30.573241vps1033 sshd[16052]: Failed password for root from 200.146.215.26 port 52882 ssh2 2020-08-01T12:19:50.766738vps1033 sshd[188
2020-08-01 00:21 attacks Brute-ForceSSH AbuseIPDB Aug 1 11:09:08 ns382633 sshd\[24842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26 user=
2020-07-31 21:31 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2020-07-31 21:13 attacks SSH AbuseIPDB Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-31 17:16 attacks Brute-ForceSSH AbuseIPDB Bruteforce detected by fail2ban
2020-07-31 14:30 attacks Brute-ForceSSH AbuseIPDB Aug 1 01:12:08 h2646465 sshd[22285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26 user=root
2020-07-31 11:04 attacks Brute-ForceSSH AbuseIPDB Jul 31 22:04:04 h2829583 sshd[19355]: Failed password for root from 200.146.215.26 port 29800 ssh2
2020-07-30 21:09 attacks Brute-ForceSSH AbuseIPDB IP blocked
2020-01-14 02:33 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-14 02:33 attacks Brute-ForceSSH AbuseIPDB Jan 14 13:33:30 MK-Soft-VM5 sshd[7702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.146.215.26 Jan 14
2020-01-14 05:54 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-14 06:03 attacks FTP Brute-ForceHacking AbuseIPDB Jan 14 16:48:59 pl3server sshd[20845]: reveeclipse mapping checking getaddrinfo for 200-146-215-026.static.ctbctelecom.com.br [200.146.215.26] failed
2020-01-14 10:36 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-14 11:01 attacks Brute-ForceSSH AbuseIPDB SSH Brute-Force attacks
2020-01-14 11:05 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-14 14:55 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-15 02:52 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-01-15 03:17 attacks Port ScanHacking AbuseIPDB Unauthorized connection attempt detected from IP address 200.146.215.26 to port 2220 [J]
2020-07-31 15:56 attacks bi_any_0_1d BadIPs.com  
2020-07-31 15:56 attacks SSH bi_sshd_0_1d BadIPs.com  
2020-07-31 15:57 attacks SSH bi_ssh_0_1d BadIPs.com  
2020-07-31 15:57 attacks blocklist_de Blocklist.de  
2020-07-31 15:57 attacks SSH blocklist_de_ssh Blocklist.de  
2020-07-31 15:59 attacks darklist_de darklist.de  
2020-07-31 16:01 attacks firehol_level2 FireHOL  
2020-07-31 16:03 attacks firehol_level4 FireHOL  
2020-07-31 16:10 attacks greensnow GreenSnow.co  
2020-07-31 16:11 attacks SSH haley_ssh Charles Haley  
2020-08-02 14:00 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2020-08-02 14:00 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2020-08-02 14:00 attacks SSH bi_ssh-ddos_0_1d BadIPs.com  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 200.146.215.0/25
aut-num: AS16735
abuse-c: CST87
owner: CIA DE TELECOMUNICACOES DO BRASIL CENTRAL
ownerid: 25.759.572/0001-80
responsible: Cristiano Azevedo Vinaud
owner-c: ALTSA49
tech-c: GAD19
created: 20030513
changed: 20130307
inetnum-up: 200.146.192.0/18

nic-hdl-br: ALTSA49
person: ALGAR TELECOM S/A
created: 20140820
changed: 20170411

nic-hdl-br: CST87
person: Computer Security Incident Response Team
created: 20051208
changed: 20141114

nic-hdl-br: GAD19
person: Grupo de Tratamento de Incidentes
created: 20010507
changed: 20111117
most specific ip range is highlighted
Updated : 2020-09-29