AbuseIPDB » 101.250.202.52
101.250.202.52 was found in our database!
This IP was reported 185 times. Confidence of Abuse is 100%: ?
ISP | Piranha Systems |
---|---|
Usage Type | Data Center/Web Hosting/Transit |
ASN | AS38701 |
Domain Name | piranha.co.kr |
Country |
![]() |
City | Seoul, Seoul |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 101.250.202.52:
This IP address has been reported a total of 185 times from 48 distinct sources. 101.250.202.52 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
![]() |
|
Port Scan | ||
![]() |
Blocked by UFW [29854/tcp]
Source port: 80 TTL: 57 Packet length: 40 |
Port Scan | ||
![]() |
Port probe to tcp/44970
[srv130] |
Port Scan | ||
![]() |
|
Port Scan Brute-Force SSH | ||
![]() |
[UFW2] Unauthorized connection attempt from 101.250.202.52
|
Port Scan | ||
![]() |
ufw_block_log_Evil_Communist
|
Port Scan | ||
![]() |
2 port probes: tcp/13340, tcp/4221
[srv126,srv135] |
Port Scan | ||
![]() |
Port probe to tcp/9971
[srv129] |
Port Scan | ||
![]() |
|
Port Scan Brute-Force SSH | ||
![]() |
| blocked | mielkan-sfo [31415/tcp] | source port: 55901 | ttl: 56 | packet length: 40 | tos: 0x00 |
|
Port Scan | ||
![]() |
|
Port Scan | ||
![]() |
|
Port Scan | ||
![]() |
Port probe to tcp/27909
[srv126] |
Port Scan | ||
![]() |
PortscanM
|
Port Scan | ||
![]() |
Port scanning
|
Port Scan |
Showing 1 to 15 of 185 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩