AbuseIPDB » 103.45.138.46

Check an IP Address, Domain Name, or Subnet

e.g. 3.236.231.61, microsoft.com, or 5.188.10.0/24

103.45.138.46 was found in our database!

This IP was reported 35 times. Confidence of Abuse is 59%: ?

59%
ISP Shenzhen Qianhai bird cloud computing Co. Ltd.
Usage Type Data Center/Web Hosting/Transit
Domain Name niaoyun.com
Country China
City Shenzhen, Guangdong

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 103.45.138.46:

This IP address has been reported a total of 35 times from 7 distinct sources. 103.45.138.46 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
ChillScanner
1 probe(s) @ TCP(1433)
Port Scan
_ArminS_
SP-Scan 48180:1433 detected 2021.04.30 11:05:28
blocked until 2021.06.19 04:08:15
Port Scan
StatsMe
2021-04-30T20:23:45.866128+0300
ET SCAN NMAP -sS window 1024
Port Scan
ChillScanner
1 probe(s) @ TCP(1433)
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 103.45.138.46 to port 1433 [J]
Port Scan Hacking
el-brujo
04/28/2021-13:50:20.584642 103.45.138.46 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
Hacking
ChillScanner
2 probe(s) @ TCP(1433)
Port Scan
ChillScanner
1 probe(s) @ TCP(1433)
Port Scan
Joe-Mark
Found on CINS badguys / proto=6 . srcport=57353 . dstport=1433 . (110)
Hacking Brute-Force

Showing 1 to 15 of 35 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/103.45.138.46