AbuseIPDB » 122.225.203.106

122.225.203.106 was found in our database!

This IP was reported 16,081 times. Confidence of Abuse is 100%: ?

100%
ISP Kangda Automobile Co., Ltd.Zhejiang
Usage Type Fixed Line ISP
ASN AS4134
Domain Name hzptt.zj.cn
Country China
City Ningbo, Zhejiang

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 122.225.203.106:

This IP address has been reported a total of 16,081 times from 900 distinct sources. 122.225.203.106 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
Xarcotic
[Birdo Server] SSH-Multi login Attempt
Brute-Force SSH
stom
Email Spam Brute-Force
rtbh.com.tr
list.rtbh.com.tr report: tcp/0
Brute-Force
SiyCah
IP banned by fail2ban; banned in jail postfix. Report generated by fail2abuseipdb.
Hacking Brute-Force
securemailen.nl
SMTP Brute Force
Brute-Force
Paul Smith
Email Auth Brute force attack 39/37 in last day
Brute-Force
LRob.fr
Repeated attacks detected by Fail2Ban in recidive jail
Hacking
bulkvm.com
Brute-Force SSH
Anonymous
Email Spam
SiyCah
IP banned by fail2ban; banned in jail postfix. Report generated by fail2abuseipdb.
Hacking Brute-Force
dihost
(smtpauth) Failed SMTP AUTH login from 122.225.203.106 (CN/China/-): 5 in the last 3600 secs
Brute-Force
Anonymous
Ports: 25,465,587; Direction: 0; Trigger: LF_DISTATTACK
Brute-Force SSH
SiyCah
IP banned by fail2ban; banned in jail postfix. Report generated by fail2abuseipdb.
Hacking Brute-Force
debaba
2025-06-20T11:37:54.013038+03:00 phenom sshd-session[47956]: Invalid user C
...
Brute-Force SSH
Woodie
Brute-Force SSH

Showing 1 to 15 of 16081 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: