AbuseIPDB » 13.83.129.37

13.83.129.37 was found in our database!

This IP was reported 2,483 times. Confidence of Abuse is 100%: ?

100%
ISP Microsoft Corporation
Usage Type Data Center/Web Hosting/Transit
ASN AS8075
Domain Name microsoft.com
Country United States of America
City San Jose, California

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 13.83.129.37:

This IP address has been reported a total of 2,483 times from 233 distinct sources. 13.83.129.37 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
dagami.org
SSH brute force auth login attempt.
Brute-Force SSH
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
Admins@FBN
FW-PortScan: Traffic Blocked srcport=33837 dstport=8945
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/135
Brute-Force
Pingger Shikkoken
Hacking
TrafficAnalyser
Port scanning
Port Scan
iNetWorker
firewall-block, port(s): 9443/tcp
Port Scan
oonux.net
RouterOS: Scanning detected TCP 13.83.129.37:51334 > x.x.x.x:4840
Port Scan
Lia
[UFW] 118 (TCP)
Port Scan
Anonymous
Port Scan Brute-Force
b4un0
Auto-report from pfSense: Detected suspicious activity.
Brute-Force SSH
Cyber Crusader
Hundreds of Attempts (at least) to Connect to and Access Firewall Ports
Port Scan Hacking Brute-Force
diego
Hacking
diego
Hacking

Showing 1 to 15 of 2483 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: