AbuseIPDB » 22.214.171.124
Check an IP Address, Domain Name, or Subnet
e.g. 126.96.36.199, microsoft.com, or 188.8.131.52/24
184.108.40.206 was found in our database!
This IP was reported 292 times. Confidence of Abuse is 79%: ?
|Usage Type||Data Center/Web Hosting/Transit|
|Country||United States of America|
|City||San Francisco, California|
IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.
IP Abuse Reports for 220.127.116.11:
This IP address has been reported a total of 292 times from 93 distinct sources. 18.104.22.168 was first reported on , and the most recent report was .
Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.
SSLVPN: id=sslvpn sn=xxxxxx time="2022-12-16 18:32:38" vp_time="2022-12-16 17:32:38 UTC" fw=x ... show moreSSLVPN: id=sslvpn sn=xxxxxx time="2022-12-16 18:32:38" vp_time="2022-12-16 17:32:38
UTC" fw=xxx.xxx.xxx.xxx pri=2 m=34 c=402 src=22.214.171.124 dst="xxx.xxx.xxx.xxx"
user="Unknown" usr="Unknown" msg="WAF threat prevented: Microsoft Exchange Server SSRF
(CVE-2022-41040)" URI=xxx.xxx.xxx.xxx:443/autodiscover/[email protected]/Powershell
rule-match="/autodiscover/[email protected]/powershell" AttackCat="Microsoft Exchange
Server SSRF (CVE-2022-41040)" summ="Microsoft Exchange has a vulnerability which can allow
remote attackers to execute code" sigid="1743" category="Command Execution--OS Commanding"
agent="Mozilla/5.0 zgrab/0.x" show less
ThreatBook Intelligence: Scanner,Brute Force more details on https://threatbook.io/ip/126.96.36.199
Unauthorized connection attempt from IP address 188.8.131.52 on Port 4899
tcp/443 (48 or more attempts)
RouterOS: Scanning detected TCP 184.108.40.206:38133 > x.x.x.x:80
ET SCAN Zmap User-Agent (Inbound)
|Port Scan Brute-Force|
Unsolicited connection attempts to port 32768
"GET /actuator/health HTTP/1.1"
|Bad Web Bot Web App Attack|
trying to access non-authorized port
Unauthorized connection on port 23.
Attempted to connect to endleSSH SSH tarpit
Dec 18 17:57:02 SRC=220.127.116.11 PROTO=TCP SPT=51484 DPT=22 SYN
|Port Scan SSH|
Showing 1 to 15 of 292 reports
Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩