AbuseIPDB » 122.5.83.146

122.5.83.146 was found in our database!

This IP was reported 89 times. Confidence of Abuse is 76%: ?

76%
ISP CHINANET SHANDONG PROVINCE NETWORK
Usage Type Fixed Line ISP
ASN AS4134
Hostname(s) 146.83.5.122.broad.zb.sd.dynamic.163data.com.cn
Domain Name chinatelecom.cn
Country China
City Shanghai, Shanghai

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 122.5.83.146:

This IP address has been reported a total of 89 times from 33 distinct sources. 122.5.83.146 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
KPS
PortscanM
Port Scan
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
ThreatBook.io
ThreatBook Intelligence: Dynamic IP more details on http://threatbook.io/ip/122.5.83.146
SSH
MPL
tcp/23 (4 or more attempts)
Port Scan
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
Anonymous
Tried our host z.
Port Scan Hacking Exploited Host
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
ThreatBook.io
ThreatBook Intelligence: Dynamic IP more details on http://threatbook.io/ip/122.5.83.146
SSH
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
MPL
tcp/23 (2 or more attempts)
Port Scan
webnestify
[Webnestify Honeypot] Unauthorized connection attempt on port 23
Port Scan Hacking Brute-Force
MPL
tcp/23 (4 or more attempts)
Port Scan

Showing 1 to 15 of 89 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: