AbuseIPDB » 195.144.21.56

195.144.21.56 was found in our database!

This IP was reported 62,036 times. Confidence of Abuse is 100%: ?

100%
ISP BlackHOST Ltd.
Usage Type Data Center/Web Hosting/Transit
Hostname(s) red3.census.shodan.io
Domain Name black.host
Country Austria
City Vienna, Wien

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 195.144.21.56:

This IP address has been reported a total of 62,036 times from 998 distinct sources. 195.144.21.56 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 4443
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 789 [T]
Port Scan
stfw
771/tcp 23023/tcp 9160/tcp...
[2020-11-11/2021-01-11]213pkt,133pt.(tcp),27pt.(udp)
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 11211
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 444 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 8181
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 789 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 7634 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 6664
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 8009 [T]
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 195.144.21.56 to port 8098
Hacking
Hans Wurst
1610371364 - 01/11/2021 14:22:44 Host: 195.144.21.56/195.144.21.56 Port: 15 TCP Blocked
...
Port Scan
ChillScanner
<SMTPS> TCP (SYN) 195.144.21.56:17313 -> port 465, len 44
Port Scan
Saleh7
srv02 Mass scanning activity detected Target: 1599 ..
Port Scan Hacking
Nazgul
SSH brute force attempt (t)
Brute-Force SSH

Showing 60436 to 60450 of 62036 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com