AbuseIPDB » 102.214.10.246
102.214.10.246 was found in our database!
This IP was reported 38 times. Confidence of Abuse is 55%: ?
ISP | ADC_SAMRAND |
---|---|
Usage Type | Data Center/Web Hosting/Transit |
ASN | AS329166 |
Hostname(s) |
mail.wordpressvps.co.za |
Domain Name | absolutehosting.co.za |
Country |
![]() |
City | Johannesburg, Gauteng |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 102.214.10.246:
This IP address has been reported a total of 38 times from 16 distinct sources. 102.214.10.246 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
Anonymous |
IP & Port Scan.
|
Port Scan Brute-Force SSH | ||
![]() |
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
|
Port Scan | ||
![]() |
|
Port Scan Brute-Force SSH | ||
![]() |
|
Port Scan Brute-Force SSH | ||
Anonymous |
Unauthorized connection to SSH port 22
|
Port Scan SSH | ||
![]() |
IPS:drop <attempted break-in> dstport=22
|
Hacking Brute-Force SSH | ||
![]() |
Noxious/Nuisible/вредоносный Host.
|
Port Scan Exploited Host | ||
![]() |
ports, 22/24H:1/7D:2
|
Port Scan | ||
![]() |
PortscanN
|
Port Scan | ||
![]() |
FW-PortScan: Traffic Blocked srcport=57189 dstport=22
|
Port Scan Hacking SSH | ||
![]() |
SSH intrusion attempt from mail.wordpressvps.co.za port 41294
|
Brute-Force SSH | ||
![]() |
SSH intrusion attempt from mail.wordpressvps.co.za port 41296
|
Brute-Force SSH | ||
![]() |
CAS-W: TCP-Scanner. Port: 22
|
Port Scan | ||
![]() |
SS5-W: TCP-Scanner. Port: 22
|
Port Scan | ||
![]() |
FW-PortScan: Traffic Blocked srcport=57183 dstport=22
|
Port Scan Hacking SSH |
Showing 1 to 15 of 38 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩