AbuseIPDB » 182.242.139.171

182.242.139.171 was found in our database!

This IP was reported 1,068 times. Confidence of Abuse is 100%: ?

100%
ISP CHINANET YunNan PROVINCE NETWORK
Usage Type Data Center/Web Hosting/Transit
ASN AS134765
Domain Name chinatelecom.cn
Country China
City Shanghai, Shanghai

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 182.242.139.171:

This IP address has been reported a total of 1,068 times from 83 distinct sources. 182.242.139.171 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
StatsMe
2025-05-03T12:53:50.935647+0300
ET SCAN Suspicious inbound to MSSQL port 1433
Port Scan
RAP
2025-05-04 03:33:39 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
ozisp.com.au
Port Scan Hacking
Anonymous
Drop from IP address 182.242.139.171 to tcp-port 1433
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/1433
Brute-Force
RAP
2025-05-02 13:59:49 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
RAP
2025-05-02 10:18:13 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
RAP
2025-05-02 07:44:05 UTC Unauthorized activity to TCP port 1433. SQL
Port Scan
ATV
Unsolicited connection attempts to port 1433
Hacking
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 4 times in the last 10800 seconds
DDoS Attack
rtbh.com.tr
list.rtbh.com.tr report: tcp/1433
Brute-Force
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
MPL
tcp/1433
Port Scan
MPL
tcp/1433 (6 or more attempts)
Port Scan

Showing 106 to 120 of 1068 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: