AbuseIPDB » 193.56.29.49

Enter an IP Address, Domain Name, or Subnet:

e.g.   18.212.93.234, microsoft.com, or 5.188.10.0/23

193.56.29.49 was found in our database!

This IP was reported 63 times. Confidence of Abuse is 24%: ?

24%
ISP Web Hosted Group Ltd
Usage Type Data Center/Web Hosting/Transit
Domain Name Unknown
Country -
City Leeds, England

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location. Contact them to update it!

IP Abuse Reports for 193.56.29.49:

This IP address has been reported a total of 63 times from 4 distinct sources. 193.56.29.49 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
andrew.stream
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(07:57)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(02:23)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(01:08)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(07:54)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(10:49)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(09:55)
Port Scan Hacking Brute-Force
stfw
445/tcp 445/tcp 445/tcp...
[2018-10-10/12-10]8pkt,1pt.(tcp)
Port Scan
andrew.stream
[portscan] tcp/139 [NetBIOS Session Service]

*(RWIN=1024)(10:28)
Port Scan
andrew.stream
Port Scan
andrew.stream
[portscan] tcp/139 [NetBIOS Session Service]

*(RWIN=1024)(08:24)
Port Scan
andrew.stream
[portscan] tcp/139 [NetBIOS Session Service]

*(RWIN=1024)(11:16)
Port Scan
Actionhenkt
OTX ip rep malicious host - AlienVault NIDS: "ET SCAN NMAP -sS window 1024" on port 139 protocol tcp
Port Scan
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(10:34)
Port Scan Hacking Brute-Force
andrew.stream
[SMB remote code execution attempt: port tcp/445]

*(RWIN=1024)(10:55)
Port Scan Hacking Brute-Force

Showing 1 to 15 of 63 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/193.56.29.49