AbuseIPDB » 193.163.125.22

Check an IP Address, Domain Name, or Subnet

e.g. 44.192.65.228, microsoft.com, or 5.188.10.0/24

193.163.125.22 was found in our database!

This IP was reported 1,250 times. Confidence of Abuse is 100%: ?

100%
ISP Constantine Cybersecurity Ltd.
Usage Type Data Center/Web Hosting/Transit
Hostname(s) wonderful.census.cyber.casa
Domain Name cyber.casa
Country United Kingdom of Great Britain and Northern Ireland
City London, England

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 193.163.125.22:

This IP address has been reported a total of 1,250 times from 64 distinct sources. 193.163.125.22 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
_ArminS_
WEB-Scan 36572:80 detected 2022.06.26 12:28:44
blocked until 2022.08.15 05:31:31
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 1983737868 at DstPort 22490
Port Scan
Joe-Mark
Found on CINS badguys / proto=6 . srcport=39387 . dstport=1102 . (2384)
Port Scan
StatsMe
2022-06-25T23:42:29.154510+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
ChillScanner
1 probe(s) @ TCP(22)
Port Scan
Little Iguana
trying to access non-authorized port
Port Scan
ChillScanner
1 probe(s) @ TCP(81)
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 2785254503 at DstPort 544
Port Scan
derLoosi
HV1.1 Blocked by UFW
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 3465910672 at DstPort 11711
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 3224679636 at DstPort 8092
Port Scan
StatsMe
2022-06-22T04:09:08.792491+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 77111211 at DstPort 324
Port Scan
Yariya.sh
[Neko CA] Unauthorized TCP SYN Packet from 193.163.125.22 seq 1953898714 at DstPort 5086
Port Scan
StatsMe
2022-06-21T14:23:42.586075+0300
ET DROP Dshield Block Listed Source group 1
Port Scan Hacking Spoofing Brute-Force

Showing 1 to 15 of 1250 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com