AbuseIPDB » 158.140.190.222

Check an IP Address, Domain Name, or Subnet

e.g. 18.207.108.182, microsoft.com, or 5.188.10.0/24

158.140.190.222 was found in our database!

This IP was reported 49 times. Confidence of Abuse is 79%: ?

79%
ISP PT. Eka Mas Republik
Usage Type Fixed Line ISP
Hostname(s) host-158.140.190-222.myrepublic.co.id
Domain Name myrepublic.net.id
Country Indonesia
City Jakarta, Jakarta Raya

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 158.140.190.222:

This IP address has been reported a total of 49 times from 15 distinct sources. 158.140.190.222 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
ChillScanner
<MICROSOFT-DS> TCP (SYN) 158.140.190.222:65415 -> port 445, len 52
Port Scan
SE-botlist
Port scan denied
Port Scan
ChillScanner
<MICROSOFT-DS> TCP (SYN) 158.140.190.222:57994 -> port 445, len 52
Port Scan
stfw
445/tcp 445/tcp 445/tcp...
[2020-12-06/2021-01-24]7pkt,1pt.(tcp)
Port Scan
NotACaptcha
Port Scan
ChillScanner
<MICROSOFT-DS> TCP (SYN) 158.140.190.222:62580 -> port 445, len 48
Port Scan
ChillScanner
<MICROSOFT-DS> TCP (SYN) 158.140.190.222:48115 -> port 445, len 48
Port Scan
ChillScanner
<SMB> TCP (SYN) 158.140.190.222:51404 -> port 445, len 52
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 158.140.190.222 to port 445 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 158.140.190.222 to port 445 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 158.140.190.222 to port 445 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 158.140.190.222 to port 445 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 158.140.190.222 to port 445 [T]
Port Scan
ChillScanner
<MICROSOFT-DS> TCP (SYN) 158.140.190.222:3958 -> port 445, len 52
Port Scan
etu brutus
21/1/[email protected]:07:21: FAIL: Alarm-Intrusion address from=158.140.190.222
...
Hacking Brute-Force IoT Targeted

Showing 1 to 15 of 49 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/158.140.190.222