AbuseIPDB » 1.30.20.98

1.30.20.98 was found in our database!

This IP was reported 10,811 times. Confidence of Abuse is 100%: ?

100%
ISP China unicom InnerMongolia province network
Usage Type Fixed Line ISP
ASN AS4837
Domain Name chinaunicom.cn
Country China
City Hohhot, Inner Mongolia

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 1.30.20.98:

This IP address has been reported a total of 10,811 times from 702 distinct sources. 1.30.20.98 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
LRob.fr
SMTP brute-force detected by Fail2Ban in plesk-postfix jail
Email Spam Brute-Force
Tefexia
Brute force attempt - 3 login attempts (3 failed)
Brute-Force
ThreatBook.io
ThreatBook Intelligence: Zombie,Spam more details on https://threatbook.io/ip/1.30.20.98
SSH
www.tana.it
SMTP auth dictionary attack
Brute-Force
bmino.pl
Brute-Force
Joe-Mark
Email Spam
Infocom
MAIL_Brute-Force
Brute-Force
Paul Smith
Email Auth Brute force attack 31/30 in last day
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
bulkvm.com
[bulkvm.com/honeypot] Unauthorized SSH access attempt. Port: 48286, Time: 2025-06-20 19:28:50 UTC
Brute-Force SSH
triplecode
Reported from hMailServer
Email Spam
jasperedv.de
Failed SMTP Login - Brutforcing
Email Spam Brute-Force
Anonymous
1.30.20.98 (CN/China/-/-/-/[redacted]
Brute-Force
DSSYSTEMS
Automatic report from DSS firewall log.
Port Scan Hacking Brute-Force
raspi4
Fail2Ban Ban Triggered
Brute-Force SSH

Showing 46 to 60 of 10811 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: