AbuseIPDB » 165.227.137.53

165.227.137.53 was found in our database!

This IP was reported 26 times. Confidence of Abuse is 90%: ?

90%
ISP DigitalOcean, LLC
Usage Type Data Center/Web Hosting/Transit
ASN AS14061
Domain Name digitalocean.com
Country Germany
City Frankfurt am Main, Hesse

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 165.227.137.53:

This IP address has been reported a total of 26 times from 20 distinct sources. 165.227.137.53 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
ThreatBook.io
ThreatBook Intelligence: Zombie,Spam more details on https://threatbook.io/ip/165.227.137.53
SSH
begou.dev
[Threat Intelligence] Port Scanning and/or Unauthorized access -> TCP/445
Port Scan
strefapi_com
Brute-force or trying open relay
...
Brute-Force Web App Attack
ThreatBook.io
ThreatBook Intelligence: Zombie,Spam more details on https://threatbook.io/ip/165.227.137.53
SSH
vanadrighem.eu
Brute-Force SSH
_ArminS_
SP-Scan 20235:9042 detected 2025.04.15 13:07:28
blocked until 2025.06.04 06:10:15
Port Scan
gu-alvareza
Nmap.Script.Scanner
Port Scan
ThreatBook.io
SSH
mkaraki
1744633738 # Service_probe # SIGNATURE_SEND # source_ip:165.227.137.53 # dst_port:143
...
Port Scan
gu-alvareza
Nmap.Script.Scanner
Port Scan
i-turnradio.nl
2025-04-14 @ 01:24:36 (CET) ~ Blocked for trying to access: /sdk
Web App Attack
Kraften
Dovecot imap-login
...
DDoS Attack Brute-Force
abusiveIntelligence
RDP connect attempt: Nmap Scanner
Brute-Force
Study Bitcoin 🤗
SSH Fail2Ban [gda]
Brute-Force
Anonymous
Kept connecting and disconnecting without issuing any commands
DDoS Attack

Showing 1 to 15 of 26 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: