AbuseIPDB » 124.35.120.241

124.35.120.241 was found in our database!

This IP was reported 18 times. Confidence of Abuse is 57%: ?

57%
ISP ARTERIA Networks Corporation
Usage Type Data Center/Web Hosting/Transit
ASN AS17506
Hostname(s) 124-35-120-241.tokyo.fdn.vectant.ne.jp
Domain Name arteria-net.com
Country Japan
City Hatsudai, Tokyo

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 124.35.120.241:

This IP address has been reported a total of 18 times from 12 distinct sources. 124.35.120.241 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
ThreatBook.io
ThreatBook Intelligence: vpn_proxy more details on http://threatbook.io/ip/124.35.120.241
SSH
abuse.byteshield.ro
Port Scan Brute-Force IoT Targeted
RAP
2025-06-25 11:54:08 UTC Unauthorized activity to TCP port 23. Telnet
Port Scan
MPL
tcp/23 (2 or more attempts)
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
ps-center
MYH-W: TCP-Scanner. Port: 23
Port Scan
Anonymous
Port Scanner
Port Scan
ThreatBook.io
ThreatBook Intelligence: vpn_proxy more details on http://threatbook.io/ip/124.35.120.241
SSH
Josh S.
Port Scan Hacking Brute-Force
security.rdmc.fr
Port Scan Attack proto:TCP src:35268 dst:23
Port Scan
MPL
tcp/23 (4 or more attempts)
Port Scan
EGP Abuse Dept
Unauthorized connection to Telnet port 23
Port Scan Hacking
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force
Anonymous
Hit honeypot r.
Port Scan Hacking Exploited Host
rtbh.com.tr
list.rtbh.com.tr report: tcp/23
Brute-Force

Showing 1 to 15 of 18 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: