AbuseIPDB » 106.75.20.12
106.75.20.12 was found in our database!
This IP was reported 561 times. Confidence of Abuse is 43%: ?
ISP | Shanghai UCloud Information Technology Company Limited |
---|---|
Usage Type | Commercial |
ASN | AS4808 |
Domain Name | ucloud.cn |
Country |
![]() |
City | Beijing, Beijing |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 106.75.20.12:
This IP address has been reported a total of 561 times from 188 distinct sources. 106.75.20.12 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
![]() |
SSH brute force auth login attempt.
|
Brute-Force SSH | ||
![]() |
[2025-02-10 03:19:24.839343] TELNET/8080 Unautorized connection, Suspicious Mirai Botnet.
|
DDoS Attack Port Scan Hacking Brute-Force IoT Targeted | ||
![]() |
SMTP AUTH NTLM attempt
|
Brute-Force | ||
![]() |
|
Port Scan Brute-Force SSH | ||
![]() |
[Threat Intelligence] Port Scanning and/or Unauthorized access -> TCP/25
|
Port Scan | ||
![]() |
GoPot Honeypot
|
Port Scan Hacking | ||
![]() |
[Threat Intelligence] Port Scanning and/or Unauthorized access -> TCP/3306
|
Port Scan | ||
![]() |
|
Hacking Brute-Force SSH | ||
![]() |
|
Brute-Force | ||
![]() |
Port probe to tcp/25 (smtp)
[srv133] |
Email Spam Port Scan | ||
![]() |
Unauthorized Access Attempt
|
Port Scan Hacking Web App Attack | ||
![]() |
Hacking, Brute-Force, Web App Attack
|
Hacking Brute-Force Web App Attack | ||
![]() |
[22:58] Tried to connect to SSH on port 22 but didn't have a valid header (port scanner?)
|
Brute-Force SSH | ||
![]() |
|
Brute-Force SSH | ||
![]() |
1738774944 # Service_probe # SIGNATURE_SEND # source_ip:106.75.20.12 # dst_port:8060
... |
Port Scan |
Showing 1 to 15 of 561 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩