AbuseIPDB » 137.116.144.39

Check an IP Address, Domain Name, or Subnet

e.g. 3.237.27.159, microsoft.com, or 5.188.10.0/24

137.116.144.39 was found in our database!

This IP was reported 2,834 times. Confidence of Abuse is 100%: ?

100%
ISP Microsoft Corporation
Usage Type Data Center/Web Hosting/Transit
Domain Name microsoft.com
Country Singapore
City Singapore, Singapore

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 137.116.144.39:

This IP address has been reported a total of 2,834 times from 312 distinct sources. 137.116.144.39 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
ISPLtd
Sep 29 17:22:26 SRC=137.116.144.39 PROTO=TCP SPT=52721 DPT=22 SYN
...
Port Scan SSH
Hirte
LT: TCP-Scanner. Port: 22
Port Scan
mueller-nils.com
Brute-Force SSH
laotuo
Brute-Force SSH
ChillScanner
2 probe(s) @ TCP(22)
Port Scan
ghostwarriors
Unauthorized connection attempt detected, SSH Brute-Force
Port Scan Brute-Force SSH
Anonymous
Brute-Force SSH
imgzit
Port 22 SSH Bruteforcing - Caught by Zit Honeypot
Brute-Force SSH
wnbhosting.dk
Invalid user xq from 137.116.144.39 port 43874
Brute-Force SSH
tmiland
(sshd) Failed SSH login from 137.116.144.39 (SG/Singapore/-): 5 in the last 3600 secs
Brute-Force SSH
Anonymous
TCP/22 probe
Port Scan SSH
Ross Wheatley
Failed password for root from 137.116.144.39 port 42300 ssh2
Brute-Force SSH
Ross Wheatley
invalid user yhk from 137.116.144.39 port 49754 ssh2
Brute-Force SSH
Finder
Invalid user newftpuser from 137.116.144.39 port 55902
Brute-Force SSH
Enki
Invalid user xq from 137.116.144.39 port 48200
Brute-Force SSH

Showing 1 to 15 of 2834 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com