AbuseIPDB » 144.48.38.182

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.90.95, microsoft.com, or 5.188.10.0/24

144.48.38.182 was found in our database!

This IP was reported 68 times. Confidence of Abuse is 89%: ?

89%
ISP Ransom IT Infrastructure
Usage Type Data Center/Web Hosting/Transit
Domain Name ransomit.com.au
Country Australia
City Melbourne, Victoria

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 144.48.38.182:

This IP address has been reported a total of 68 times from 34 distinct sources. 144.48.38.182 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
bnt
Triggered WAF | [action]: block | [clientIP]: 144.48.38.182
DDoS Attack Open Proxy VPN IP Web App Attack
openstrike.co.uk
Web App Attack
Dolphi
POST //xmlrpc.php
Brute-Force Web App Attack
Maykson
Exploited Host Web App Attack
zynex
URL Probing: /fr/home/wp-includes/wlwmanifest.xml
Web App Attack
Clapper
Brute-Force Bad Web Bot
10dencehispahard SL
Abusive use detected
Brute-Force
Roderic
(wordpress) Failed wordpress login from 144.48.38.182 (AU/Australia/-)
Brute-Force
Roderic
(mod_security) mod_security triggered on hostname [redacted] 144.48.38.182 (AU/Australia/-)
SQL Injection
Ba-Yu
WordPress hacking/exploits/scanning
Web Spam Hacking Brute-Force Exploited Host Web App Attack
Maykson
Exploited Host Web App Attack
vfinder
Backdrop CMS module - Request: //wp-includes/wlwmanifest.xml
Bad Web Bot Web App Attack
nyclee.net
Excessive Request/Connection Hacking Attempt to HoneyPot
Hacking Brute-Force
Maykson
Exploited Host Web App Attack
Inaxas AG
Fraud VoIP Port Scan Brute-Force

Showing 1 to 15 of 68 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com