AbuseIPDB » 167.94.138.149

Check an IP Address, Domain Name, or Subnet

e.g. 3.215.79.204, microsoft.com, or 5.188.10.0/24

167.94.138.149 was found in our database!

This IP was reported 2,809 times. Confidence of Abuse is 100%: ?

100%
ISP Censys Inc.
Usage Type Search Engine Spider
Hostname(s) scanner-14.ch1.censys-scanner.com
Domain Name censys.io
Country United States of America
City Ann Arbor, Michigan

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 167.94.138.149:

This IP address has been reported a total of 2,809 times from 65 distinct sources. 167.94.138.149 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
security.rdmc.fr
Automatic report - Banned IP Access
Web App Attack
QUADEMU Abuse
Noxious/Nuisible/вредоносный Host.
Port Scan Brute-Force
stfw
2380/tcp 50022/tcp 12542/tcp...
[2022-05-02/07-01]563pkt,476pt.(tcp),1pt.(udp)
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 167.94.138.149 on Port 62865
Port Scan
mkey
Multiple ports scan.
Port Scan
IP Analyzer
Unauthorized connection attempt from IP address 167.94.138.149 on Port 9944
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 167.94.138.149 seq 3321882485 at DstPort 16888
Port Scan
KPS
PortscanM
Port Scan
sebaro11
Portscan on 18072/TCP blocked by UFW
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
auto_reporter
Unauthorized port sweep
Port Scan
JPPO
Port Scan
StatsMe
2022-06-30T03:15:49.289830+0300
ET SCAN NMAP -sS window 1024
Port Scan
Blodröd
Port scanning
Port Scan

Showing 1 to 15 of 2809 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com