AbuseIPDB » 140.210.20.134

Check an IP Address, Domain Name, or Subnet

e.g. 44.210.77.106, microsoft.com, or 5.188.10.0/24

140.210.20.134 was found in our database!

This IP was reported 28 times. Confidence of Abuse is 19%: ?

19%
ISP Jangsu Bangrun Network Technology Co. Ltd.
Usage Type Data Center/Web Hosting/Transit
Domain Name llidc.com
Country China
City Yangzhou, Jiangsu

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 140.210.20.134:

This IP address has been reported a total of 28 times from 21 distinct sources. 140.210.20.134 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Hirte
LT: TCP-Scanner. Port: 6379
Port Scan
Sawasdee
Port Scan
...
Port Scan
stfw
6379/tcp 6379/tcp 6379/tcp
[2022-10-02/07]3pkt
Port Scan
ChillScanner
1 probe(s) @ TCP(6379)
Port Scan
gaido
SSH brute force attack detected from [140.210.20.134]
Brute-Force SSH
☢MiG☢
Cisco IOS XR probe(s) @ TCP 6379 CN
Port Scan
Hirte
SS1-W: TCP-Scanner. Port: 22
Port Scan
Hirte
LT: TCP-Scanner. Port: 6379
Port Scan
ChillScanner
1 probe(s) @ TCP(6379)
Port Scan
xyz.rip
SSH Bruteforce...
Brute-Force SSH
www.remote24.se
3389BruteforceStormFW21
Brute-Force
mindlesstux
Brute-Force SSH
guldkage
Unauthorized connection attempt detected from IP address 140.210.20.134 to port 22 (ger-01) [V]
Brute-Force Exploited Host
RoboSOC
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
Port Scan
wblondel
Brute-Force SSH

Showing 1 to 15 of 28 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: