AbuseIPDB » 1.222.139.15

Check an IP Address, Domain Name, or Subnet

e.g. 54.85.57.0, microsoft.com, or 5.188.10.0/24

1.222.139.15 was found in our database!

This IP was reported 21 times. Confidence of Abuse is 41%: ?

41%
ISP LG Dacom Corporation
Usage Type Unknown
Domain Name uplus.co.kr
Country Korea (Republic of)
City Seoul, Seoul-teukbyeolsi

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 1.222.139.15:

This IP address has been reported a total of 21 times from 10 distinct sources. 1.222.139.15 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Hiffo
1611229292 - 01/21/2021 12:41:32 Host: 1.222.139.15/1.222.139.15 Port: 23 TCP Blocked
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23 [T]
Port Scan
gbetsis
Telnet Server BruteForce Attack
Brute-Force
ChillScanner
<TELNET, SSH> TCP (SYN) 1.222.139.15:54003 -> port 23, len 40
Port Scan SSH
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 8443
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 5555 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 5555 [T]
Port Scan
Parth Maniar
SSH login attempts.
Brute-Force SSH
ChillScanner
<TELNET> TCP (SYN) 1.222.139.15:9553 -> port 23, len 44
Port Scan
RoboSOC
D-Link DAP-1860 Remote Command Injection Vulnerability, PTR: PTR record not found
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 1.222.139.15 to port 23
Hacking

Showing 1 to 15 of 21 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/1.222.139.15