AbuseIPDB » 124.31.104.121
124.31.104.121 was found in our database!
This IP was reported 83 times. Confidence of Abuse is 32%: ?
ISP | CHINANET Xizang(Tibet) province network |
---|---|
Usage Type | Mobile ISP |
ASN | AS4134 |
Domain Name | chinatelecom.cn |
Country |
![]() |
City | Shanghai, Shanghai |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 124.31.104.121:
This IP address has been reported a total of 83 times from 13 distinct sources. 124.31.104.121 was first reported on , and the most recent report was .
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
![]() |
124.31.104.121 triggered Icarus honeypot on port 143. Check us out on github.
|
Port Scan Hacking | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
![]() |
1744688355 - 04/14/2025 23:39:15 Host: 124.31.104.121/124.31.104.121 Port: 143 TCP Blocked
|
Port Scan | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
![]() |
ThreatBook Intelligence: Zombie,Dynamic IP more details on https://threatbook.io/ip/124.31.104.121
|
Web App Attack | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
![]() |
tcp/8083 (2 or more attempts)
|
Port Scan | ||
![]() |
tcp/3389 (2 or more attempts)
|
Port Scan | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
Anonymous |
Unauthorized connection attempt
|
Port Scan Hacking Exploited Host | ||
![]() |
Port probe to tcp/3307 (op session proxy)
[srv135] |
Port Scan |
Showing 1 to 15 of 83 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩