AbuseIPDB » 193.56.29.39

Enter an IP Address, Domain Name, or Subnet:

e.g.   34.228.143.13, microsoft.com, or 5.188.10.0/23

193.56.29.39 was found in our database!

This IP was reported 89 times. Confidence of Abuse is 28%: ?

28%
ISP Web Hosted Group Ltd
Usage Type Data Center/Web Hosting/Transit
Domain Name webhostedgroup.com
Country -
City Leeds, England

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location. Contact them to update it!

IP Abuse Reports for 193.56.29.39:

This IP address has been reported a total of 89 times from 6 distinct sources. 193.56.29.39 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(02161006)
Port Scan Hacking Brute-Force
nircd
SMB (445) scanning
Port Scan Hacking
nircd
SMB (445) scanning
Port Scan Hacking
Lucian Nitescu
Port Scan Hacking Web App Attack
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(02061127)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(02031157)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(01301128)
Port Scan Hacking Brute-Force
brian parsons
CAT07-01.1,99/45/80,D:445/6,S:44126
Port Scan Hacking
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01291059)
Port Scan Hacking Brute-Force
brian parsons
cat-15#01[2019-01-28T14:19:09+07:00],RL:1,80/48/78,D:445/6,S:45145
Port Scan Hacking
brian parsons
cat-07#01[2019-01-28T12:27:42+07:00],RL:1,76/44/117,D:445/6,S:58455
Port Scan Hacking
brian parsons
cat-eur#01 ☁ [2019-01-27T13:42:04+07:00],RL:3,801/56,D:445/6,S:56531/ep:swe-xf
Port Scan Hacking
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01271103)
Port Scan Hacking Brute-Force
andrew.stream
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01241302)
Port Scan Hacking Brute-Force

Showing 1 to 15 of 89 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/193.56.29.39