AbuseIPDB » 1.202.240.163
Check an IP Address, Domain Name, or Subnet
e.g. 18.215.185.97, microsoft.com, or 5.188.10.0/24
1.202.240.163 was found in our database!
This IP was reported 659 times. Confidence of Abuse is 93%: ?
ISP | ChinaNet Beijing Province Network |
---|---|
Usage Type | Unknown |
Hostname(s) |
163.240.202.1.static.bjtelecom.net |
Domain Name | chinatelecom.com.cn |
Country |
![]() |
City | Beijing, Beijing |
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 1.202.240.163:
This IP address has been reported a total of 659 times from 43 distinct sources. 1.202.240.163 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | Date | Comment | Categories | |
---|---|---|---|---|
ChillScanner |
<SMSS SQL> TCP (SYN) 1.202.240.163:11270 -> port 1433, len 44
|
Port Scan SQL Injection | ||
![]() |
MultiHost/MultiPort Probe, Scan, Hack -
|
Port Scan Hacking | ||
andrew.stream |
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01151210) |
Port Scan Hacking SQL Injection Brute-Force Exploited Host | ||
![]() |
Port scan: Attack repeated for 24 hours
|
Port Scan Hacking Exploited Host | ||
ChillScanner |
<MS-SQL-S> TCP (SYN) 1.202.240.163:63688 -> port 1433, len 44
|
Port Scan | ||
![]() |
Auto Detect Rule!
proto TCP (SYN), 1.202.240.163:40183->gjan.info:1433, len 40 |
Port Scan | ||
ChillScanner |
<MS-SQL-S> TCP (SYN) 1.202.240.163:40350 -> port 1433, len 40
|
Port Scan | ||
ChillScanner |
<SMSS SQL> TCP (SYN) 1.202.240.163:44283 -> port 1433, len 40
|
Port Scan SQL Injection | ||
IrisFlower |
Unauthorized connection attempt detected from IP address 1.202.240.163 to port 1433 [T]
|
Port Scan | ||
IrisFlower |
Unauthorized connection attempt detected from IP address 1.202.240.163 to port 1433 [T]
|
Port Scan | ||
andrew.stream |
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(01061317) |
Port Scan Hacking SQL Injection Brute-Force Exploited Host | ||
ChillScanner |
<SMSS SQL> TCP (SYN) 1.202.240.163:37893 -> port 1433, len 40
|
Port Scan SQL Injection | ||
![]() |
firewall-block, port(s): 1433/tcp
|
Port Scan | ||
![]() |
Found on CINS badguys / proto=6 . srcport=4329 . dstport=1433 . (2069)
|
Hacking Brute-Force | ||
ChillScanner |
<SMSS SQL> TCP (SYN) 1.202.240.163:43014 -> port 1433, len 40
|
Port Scan SQL Injection |
Showing 1 to 15 of 659 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.