AbuseIPDB » 138.199.60.17

138.199.60.17 was found in our database!

This IP was reported 27 times. Confidence of Abuse is 60%: ?

60%
ISP DataCamp Limited
Usage Type Data Center/Web Hosting/Transit
Domain Name datacamp.co.uk
Country Singapore
City Singapore, Singapore

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 138.199.60.17:

This IP address has been reported a total of 27 times from 19 distinct sources. 138.199.60.17 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
Linuxmalwarehuntingnl
Honeypot HIT
Brute-Force
ThreatBook.io
Web App Attack
oonux.net
RouterOS: Scanning detected TCP 138.199.60.17:41724 > x.x.x.x:9999
Port Scan
drewf.ink
[08:55] Port scanning. Port(s) scanned: TCP/8888
Port Scan
Linuxmalwarehuntingnl
Honeypot HIT
Brute-Force
begou.dev
[Threat Intelligence] FrozenThreat: Port Scanning and/or Unauthorized access -> HoneyPots:PORT/8080
Port Scan
oonux.net
RouterOS: Scanning detected TCP 138.199.60.17:46380 > x.x.x.x:8085
Port Scan
SuperCores Hosting
[2024-07-04 10:51:28.543717] TELNET/8080 Unautorized connection, Suspicious Mirai Botnet.
DDoS Attack Port Scan Hacking Brute-Force IoT Targeted
nfsec.pl
Scanning on port: 8080
Port Scan
iNetWorker
firewall-block, port(s): 1880/tcp
Port Scan
EGP Abuse Dept
Unauthorized connection to proxy port 8080
Port Scan Hacking
Linuxmalwarehuntingnl
Honeypot HIT
Brute-Force
oonux.net
RouterOS: Scanning detected TCP 138.199.60.17:53046 > x.x.x.x:1880
Port Scan
nfsec.pl
Scanning on port: 8080
Port Scan
drewf.ink
[03:20] Port scanning. Port(s) scanned: TCP/9090
Port Scan

Showing 1 to 15 of 27 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com