AbuseIPDB » 121.52.156.41

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.227.2.246, microsoft.com, or 5.188.10.0/24

121.52.156.41 was found in our database!

This IP was reported 134 times. Confidence of Abuse is 0%: ?

0%
ISP Pern-Pakistan Education & Research Network is an
Usage Type Fixed Line ISP
Hostname(s) 121.52.156.41.pern.pk
Domain Name pern.pk
Country Pakistan
City Hyderabad, Sindh

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 121.52.156.41:

This IP address has been reported a total of 134 times from 24 distinct sources. 121.52.156.41 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
iNetWorker
firewall-block, port(s): 445/tcp
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 121.52.156.41.pern.pk.
Hacking
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08261144)
Port Scan Hacking Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2019-07-02/08-25]10pkt,1pt.(tcp)
Port Scan
NotACaptcha
Unauthorised access (Aug 21) SRC=121.52.156.41 LEN=40 TTL=243 ID=21657 TCP DPT=445 WINDOW=1024 SYN
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08151038)
Port Scan Hacking Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2019-07-02/08-07]9pkt,1pt.(tcp)
Port Scan
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2019-06-04/07-31]7pkt,1pt.(tcp)
Port Scan
Anonuumi
Scanning random ports - tries to find possible vulnerable services
Port Scan
RoboSOC
Honeypot attack, port: 445, PTR: 121.52.156.41.pern.pk.
Hacking
stfw
445/tcp 445/tcp 445/tcp...
[2019-06-04/07-29]5pkt,1pt.(tcp)
Port Scan
NotACaptcha
Unauthorised access (Jul 28) SRC=121.52.156.41 LEN=40 TTL=243 ID=41838 TCP DPT=445 WINDOW=1024 SYN
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(07161101)
Port Scan Hacking Brute-Force

Showing 31 to 45 of 134 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/121.52.156.41?page=3