AbuseIPDB » 131.0.164.3

Check an IP Address, Domain Name, or Subnet

e.g. 3.235.195.196, microsoft.com, or 5.188.10.0/24

131.0.164.3 was found in our database!

This IP was reported 1,386 times. Confidence of Abuse is 100%: ?

100%
ISP Wi Fi Tec Conexao e Tecnologia Ltda - ME
Usage Type Fixed Line ISP
Domain Name wifitec.com.br
Country Brazil
City Manhumirim, Minas Gerais

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 131.0.164.3:

This IP address has been reported a total of 1,386 times from 481 distinct sources. 131.0.164.3 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Parth Maniar
Brute-Force SSH
saima.info
Failed password for user root ssh2
Brute-Force Exploited Host SSH
saima.info
Failed password for user root ssh2
Brute-Force Exploited Host SSH
Anonymous
Brute-Force SSH
nicosqc
Invalid user soporte from 131.0.164.3 port 60518
Brute-Force SSH
nicosqc
Invalid user gustavo from 131.0.164.3 port 43602
Brute-Force SSH
nicosqc
Invalid user eva from 131.0.164.3 port 42526
Brute-Force SSH
nicosqc
Invalid user userftp from 131.0.164.3 port 55504
Brute-Force SSH
nicosqc
Invalid user k from 131.0.164.3 port 57716
Brute-Force SSH
nicosqc
Invalid user eva from 131.0.164.3 port 42526
Brute-Force SSH
nicosqc
Invalid user katya from 131.0.164.3 port 57776
Brute-Force SSH
nicosqc
Invalid user kettle from 131.0.164.3 port 42052
Brute-Force SSH
nicosqc
Invalid user ts3 from 131.0.164.3 port 51612
Brute-Force SSH
nicosqc
Invalid user roy from 131.0.164.3 port 39324
Brute-Force SSH
nicosqc
Invalid user erp from 131.0.164.3 port 40650
Brute-Force SSH

Showing 1 to 15 of 1386 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com