AbuseIPDB » 102.132.242.83

102.132.242.83 was found in our database!

This IP was reported 490 times. Confidence of Abuse is 34%: ?

34%
ISP Cool Ideas Service Provider (Pty) Ltd
Usage Type Fixed Line ISP
Hostname(s) nmkz-cust.coolideas.co.za
Domain Name cisp.co.za
Country South Africa
City Cape Town, Western Cape

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 102.132.242.83:

This IP address has been reported a total of 490 times from 47 distinct sources. 102.132.242.83 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
RAP
2023-11-24 20:37:19 UTC Unauthorized activity to TCP port 8080. Web App
Port Scan Web App Attack
RAP
2023-11-06 08:40:29 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
Smel
MH/MP Probe, Scan, Hack -
Port Scan Hacking
Block_Steady_Crew
Honeypot snared from 102.132.242.83
Port Scan Web App Attack
Smel
MH/MP Probe, Scan, Hack -
Port Scan Hacking
ZaneTheOperator
1697256305 - 10/14/2023 00:05:05 Host: nmkz-cust.coolideas.co.za/102.132.242.83 Port: 23 TCP Blocked
Port Scan
Smel
MH/MP Probe, Scan, Hack -
Port Scan Hacking
MPL
tcp/80 (2 or more attempts)
Port Scan
ThreatBook.io
Web App Attack
Smel
MH/MP Probe, Scan, Hack -
Port Scan Hacking
ThreatBook.io
Brute-Force
oonux.net
RouterOS: Scanning detected TCP 102.132.242.83:12918 > x.x.x.x:80
Port Scan
Block_Steady_Crew
Honeypot snared from 102.132.242.83
Port Scan Web App Attack
sumnone
Port probing on unauthorized port 23
Port Scan Hacking Exploited Host
RAP
2023-09-10 01:37:52 UTC Unauthorized activity to TCP port 8080. Web App
Port Scan Web App Attack

Showing 16 to 30 of 490 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com