AbuseIPDB » 194.26.29.143

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.235.107.209, microsoft.com, or 5.188.10.0/24

194.26.29.143 was found in our database!

This IP was reported 124 times. Confidence of Abuse is 100%: ?

100%
ISP Media Land LLC
Usage Type Data Center/Web Hosting/Transit
Domain Name sshvps.net
Country Russian Federation
City Saint Petersburg, Sankt-Peterburg

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 194.26.29.143:

This IP address has been reported a total of 124 times from 14 distinct sources. 194.26.29.143 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter Date Comment Categories
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 34203 proto: tcp cat: Misc Attackbytes: 60
Port Scan
bSebring
08/05/2020-04:10:20.914757 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
bSebring
08/05/2020-04:03:16.299892 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 34345 proto: tcp cat: Misc Attackbytes: 60
Port Scan
bSebring
08/05/2020-01:44:20.184424 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
bSebring
08/05/2020-01:40:55.435509 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 34738 proto: tcp cat: Misc Attackbytes: 60
Port Scan
SecondEdge
Port-scan: detected 276 distinct ports within a 24-hour window.
Port Scan
bSebring
08/04/2020-22:15:15.068919 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 34554 proto: tcp cat: Misc Attackbytes: 60
Port Scan
bSebring
08/04/2020-19:48:19.774768 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
Ukn0w1t
ET DROP Dshield Block Listed Source group 1 - port: 34472 proto: tcp cat: Misc Attackbytes: 60
Port Scan
kiwi.network
Port scan: Attack repeated for 24 hours
Port Scan Hacking Exploited Host
bSebring
08/04/2020-17:19:58.894041 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan
bSebring
08/04/2020-16:32:32.313793 194.26.29.143 Protocol: 6 ET SCAN NMAP -sS window 1024
Port Scan

Showing 1 to 15 of 124 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/194.26.29.143