AbuseIPDB » 144.22.137.242

Check an IP Address, Domain Name, or Subnet

e.g. 35.172.223.251, microsoft.com, or 5.188.10.0/24

144.22.137.242 was found in our database!

This IP was reported 103 times. Confidence of Abuse is 76%: ?

76%
ISP Oracle Corporation
Usage Type Data Center/Web Hosting/Transit
Domain Name oracle.com
Country Brazil
City Sao Paulo, Sao Paulo

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 144.22.137.242:

This IP address has been reported a total of 103 times from 45 distinct sources. 144.22.137.242 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
syokadmin
(PERMBLOCK) 144.22.137.242 (BR/Brazil/-) has had more than 2 temp blocks in the last 86400 secs
Brute-Force
Anonymous
Multiple VPN SSL Login attempts
VPN IP Brute-Force
syokadmin
(imapd) Failed IMAP login from 144.22.137.242 (BR/Brazil/-): 5 in the last 3600 secs
Brute-Force
SecondBanana
Brute-Force SSH
Anonymous
Brute-Force
6kilowatti
144.22.137.242 triggered Icarus honeypot on port 22. Server: Lempäälä. Check us out on github.
Port Scan Hacking
EIC
(php-url-fopen) Failed php-url-fopen trigger from 144.22.137.242 (BR/Brazil/-)
Web App Attack
theitjuggler.com
Jul 15 15:12:15 localhost sshd[3334146]: Invalid user admin from 144.22.137.242 port 60316
...
Brute-Force SSH
serverargentina.com
Brute-Force SSH
sverre26
Bruteforce detected by fail2ban
Brute-Force SSH
kutswa.com
$f2bV_matches
Brute-Force SSH
Custard
Jul 7 19:59:32 localhost sshd[779791]: Invalid user admin from 144.22.137.242 port 44018
Brute-Force SSH
ranklord
F2B blocked SSH BF
Brute-Force SSH
Anonymous
Brute-Force
Anonymous
VPN IP

Showing 1 to 15 of 103 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com