AbuseIPDB » 164.92.117.249

Check an IP Address, Domain Name, or Subnet

e.g. 44.201.96.43, microsoft.com, or 5.188.10.0/24

164.92.117.249 was found in our database!

This IP was reported 246 times. Confidence of Abuse is 91%: ?

91%
ISP DigitalOcean LLC
Usage Type Data Center/Web Hosting/Transit
Domain Name digitalocean.com
Country United States of America
City Santa Clara, California

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 164.92.117.249:

This IP address has been reported a total of 246 times from 39 distinct sources. 164.92.117.249 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Parth Maniar
Brute-Force SSH
cyanryaku
ufw_block_log_banned
Port Scan
geot
TCP port : 9049
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 2379 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 7081 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 8733 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 4747 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 2010 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 2323 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 8446 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 873 [J]
Port Scan Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 164.92.117.249 to port 53 [J]
Port Scan Hacking
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 164.92.117.249 seq 2927778339 at DstPort 55442
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 164.92.117.249 seq 4042149916 at DstPort 9009
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan

Showing 1 to 15 of 246 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com