AbuseIPDB » 164.52.1.14

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.214.224.224, microsoft.com, or 5.188.10.0/24

164.52.1.14 was found in our database!

This IP was reported 141 times. Confidence of Abuse is 0%: ?

0%
ISP Capital Online Data Service HK Co Ltd
Usage Type Data Center/Web Hosting/Transit
Domain Name yun-idc.com
Country Hong Kong
City Hong Kong, Hong Kong

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 164.52.1.14:

This IP address has been reported a total of 141 times from 17 distinct sources. 164.52.1.14 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
NotACaptcha
Unauthorised access (Jan 14) SRC=164.52.1.14 LEN=40 TTL=244 ID=34864 TCP DPT=445 WINDOW=1024 SYN
Port Scan
Fatumsch
Port Scan
Anonymous
port scan and connect, tcp 1433 (ms-sql-s)
Port Scan
stfw
445/tcp 1433/tcp 445/tcp...
[2018-11-08/2019-01-09]45pkt,2pt.(tcp)
Port Scan
NotACaptcha
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(01071255)
Port Scan Hacking Brute-Force
NotACaptcha
Unauthorised access (Jan 3) SRC=164.52.1.14 LEN=40 TTL=244 ID=25276 TCP DPT=1433 WINDOW=1024 SYN
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(01021951)
Port Scan Hacking Brute-Force
stfw
1433/tcp 445/tcp 445/tcp...
[2018-10-28/12-27]55pkt,2pt.(tcp)
Port Scan
Actionhenkt
AlienVault NIDS: "ET SCAN NMAP -sS window 1024" on port 445 protocol tcp
Port Scan
NotACaptcha
Dec 20 04:53:48 SRC=164.52.1.14 LEN=40 PREC=0x20 TTL=242 ID=50939 TCP DPT=445 WINDOW=1024 SYN
Port Scan
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
IP Analyzer
Unauthorized connection attempt from IP address 164.52.1.14 on Port 445(SMB)
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(12:07)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(12:49)
Port Scan Hacking Brute-Force

Showing 1 to 15 of 141 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/164.52.1.14