AbuseIPDB » 129.204.39.220

Check an IP Address, Domain Name, or Subnet

e.g. 35.170.78.142, microsoft.com, or 5.188.10.0/24

129.204.39.220 was found in our database!

This IP was reported 244 times. Confidence of Abuse is 100%: ?

100%
ISP Tencent Cloud Computing (Beijing) Co. Ltd
Usage Type Data Center/Web Hosting/Transit
Domain Name tencent.com
Country China
City Beijing, Beijing

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 129.204.39.220:

This IP address has been reported a total of 244 times from 100 distinct sources. 129.204.39.220 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
33three.eu
SSH Invalid Login
Brute-Force SSH
Joe-Mark
Found on Github Combined on 3 lists / proto=6 . srcport=42189 . dstport=2499 . (1775)
Hacking Brute-Force
Saleh7
srv02 Mass scanning activity detected Target: 2499 ..
Port Scan Hacking
RasyiidWho
DDoS Attack Port Scan Brute-Force Web App Attack SSH
Saleh7
srv02 Mass scanning activity detected Target: 5240 ..
Port Scan Hacking
mbluthardt.naksued
Brute-Force SSH
mbluthardt.naksued
Brute-Force SSH
HoneyPot-DE
Brute-Force SSH
mbluthardt.naksued
Brute-Force SSH
Anonymous
$f2bV_matches
Brute-Force SSH
shockstar.net
Brute-Force SSH
stfw
25466/tcp 12066/tcp 7283/tcp...
[2020-09-09/23]5pkt,5pt.(tcp)
Port Scan
thachpham
(sshd) Failed SSH login from 129.204.39.220 (CN/China/-): 5 in the last 3600 secs
Brute-Force SSH
compilergeek
Brute-Force SSH
Joe-Mark
Found on Dark List de / proto=6 . srcport=50757 . dstport=31580 . (3047)
Email Spam Brute-Force

Showing 1 to 15 of 244 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/129.204.39.220