AbuseIPDB » 119.61.0.140

Check an IP Address, Domain Name, or Subnet

e.g. 44.201.95.84, microsoft.com, or 5.188.10.0/24

119.61.0.140 was found in our database!

This IP was reported 1,109 times. Confidence of Abuse is 53%: ?

53%
ISP Beijing 263 Network Group
Usage Type Fixed Line ISP
Domain Name net263.com
Country China
City Beijing, Beijing

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 119.61.0.140:

This IP address has been reported a total of 1,109 times from 80 distinct sources. 119.61.0.140 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
sam1e
119.61.0.140 triggered Icarus honeypot on port 1723. Check us out on github.
Port Scan Hacking
RiSec
119.61.0.140 | Triggered sCandy Pot 0.3b | [RiSecHPOT4] | ON PORT: 1723
Port Scan Hacking
Anonymous
port scan and connect, tcp 1720 (H.323/Q.931)
Port Scan
Tha_14
Connection by 119.61.0.140 to port: 1701 triggered the honeypot at 9/2/2022 4:42:31 PM
Port Scan
Anonymous
Unauthorized connection attempt detected in the last 24 hours
Hacking
Tha_14
Connection by 119.61.0.140 to port: 1662 triggered the honeypot at 8/22/2022 8:54:44 AM
Port Scan
en0
Port Scan
QUADEMU Abuse
[New] Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
kiwi.network
Incessant port scan:
Port Scan Hacking Exploited Host
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 119.61.0.140 seq 3926721836 at DstPort 1797
Port Scan
☢MiG☢
TCP probe(s) @ 1796 CN
Port Scan
en0
Port Scan
en0
Port Scan
en0
Port Scan
en0
Port Scan

Showing 1 to 15 of 1109 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com