AbuseIPDB » 124.31.104.143
124.31.104.143 was found in our database!
This IP was reported 82 times. Confidence of Abuse is 32%: ?
ISP | CHINANET Xizang(Tibet) province network |
---|---|
Usage Type | Mobile ISP |
ASN | AS4134 |
Domain Name | chinatelecom.cn |
Country |
![]() |
City | Shanghai, Shanghai |
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 124.31.104.143:
This IP address has been reported a total of 82 times from 21 distinct sources. 124.31.104.143 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
Reporter | IoA Timestamp in UTC | Comment | Categories | |
---|---|---|---|---|
![]() |
Blocked by UFW [9595/tcp]
Source port: 16394 TTL: 236 Packet length: 44 |
Port Scan | ||
![]() |
tcp/902 (2 or more attempts)
|
Port Scan | ||
![]() |
Port probe to tcp/8010 (wingate http proxy)
[srv136] |
Port Scan | ||
![]() |
2025-06-02 01:22:41 - Unauthorized connection probe. Source on blacklist
|
Port Scan Hacking | ||
![]() |
124.31.104.143 triggered Icarus honeypot on port 23. Check us out on github.
|
Port Scan Hacking | ||
![]() |
Port probe to tcp/21 (ftp control)
[srv129] |
FTP Brute-Force Port Scan Brute-Force | ||
![]() |
tcp/1234
|
Port Scan | ||
![]() |
tcp/1234
|
Port Scan | ||
![]() |
tcp/8098
|
Port Scan | ||
![]() |
tcp/8098
|
Port Scan | ||
![]() |
tcp/27017 (2 or more attempts)
|
Port Scan | ||
![]() |
Port probing on unauthorized port 8200
|
Port Scan Hacking Exploited Host | ||
![]() |
tcp/49155 (2 or more attempts)
|
Port Scan | ||
![]() |
tcp/10243 (3 or more attempts)
|
Port Scan | ||
![]() |
[16:31] Port scanning. Port(s) scanned: TCP/873
|
Port Scan |
Showing 1 to 15 of 82 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩