AbuseIPDB » 106.75.50.44

106.75.50.44 was found in our database!

This IP was reported 606 times. Confidence of Abuse is 100%: ?

100%
ISP Shanghai UCloud Information Technology Company Limited
Usage Type Commercial
ASN AS4808
Hostname(s) ylsdjj.cn
Domain Name ucloud.cn
Country China
City Beijing, Beijing

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 106.75.50.44:

This IP address has been reported a total of 606 times from 194 distinct sources. 106.75.50.44 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
COMPLEX
Honeypot [1]: HTTP/1.1 request on 4040

GET /
Accept: */*; 4040 [5] TCP
Web App Attack
forgeban
Honeypot hit: HTTP/1.1 request on 9010

GET /
Accept: */*; 9010 [5] TCP
Hacking Bad Web Bot
public csirt
Honeypot hit: Unauthorized traffic (247 bytes of payload); 57671 [5] TCP
Port Scan
webbfabriken
Web Spam
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
drewf.ink
[08:58] Port scanning. Port(s) scanned: TCP/9090
Port Scan
drewf.ink
[03:44] Port scanning. Port(s) scanned: TCP/111
Port Scan
drewf.ink
[03:11] Triggered SMB honeypot on port 139. Type: NetBIOS + SMB2/3. Dialect(s): SMB 2.0.2
Hacking Exploited Host
webbfabriken
Web Spam
COMPLEX
Honeypot [1]: Unauthorized traffic (247 bytes of payload); 10478 [2] TCP
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
Faeeth
Multiple hits on Honeypot UID:PTRW50NM46 Port:Http (80)
Brute-Force
wsyq
Fail2Ban - \[NGINX\]40x-Forcing to access a restricted resource
...
Bad Web Bot Web App Attack
drewf.ink
[03:16] Port scanning. Port(s) scanned: TCP/995
Port Scan
Thaliruth
Hacking Brute-Force

Showing 1 to 15 of 606 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: