AbuseIPDB » 112.165.250.152

112.165.250.152 was found in our database!

This IP was reported 127 times. Confidence of Abuse is 100%: ?

100%
ISP Korea Telecom
Usage Type Fixed Line ISP
ASN AS4766
Domain Name kt.com
Country Korea (the Republic of)
City Daegu, Daegu

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 112.165.250.152:

This IP address has been reported a total of 127 times from 43 distinct sources. 112.165.250.152 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
RAP
2025-07-11 06:25:25 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
RAP
2025-07-10 23:08:39 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
oonux.net
RouterOS: Scanning detected TCP 112.165.250.152:34902 > x.x.x.x:23
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
security.rdmc.fr
Port Scan Attack proto:TCP src:34902 dst:23
Port Scan
ZFO HOSTING
[Abuse] Brute-force detected on port 54410. First attempt at 2025-07-09 15:54:38
Brute-Force
sefinek.net
Port Scan Brute-Force IoT Targeted
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
MPL
tcp/23 (2 or more attempts)
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
drewf.ink
[22:57] Attempted telnet login on port 23 with username root
Brute-Force Exploited Host
drewf.ink
[18:44] Attempted telnet login on port 2323 with username root
Brute-Force Exploited Host
drewf.ink
[18:00] Attempted telnet login on port 23 with username root
Brute-Force Exploited Host
geddo.in
Brute-Force

Showing 1 to 15 of 127 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: