AbuseIPDB » 197.248.24.129

197.248.24.129 was found in our database!

This IP was reported 233 times. Confidence of Abuse is 100%: ?

100%
ISP Safaricom Limited
Usage Type Unknown
Hostname(s) 197-248-24-129.safaricombusiness.co.ke
Domain Name safaricom.co.ke
Country Kenya
City Nairobi, Nairobi City

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 197.248.24.129:

This IP address has been reported a total of 233 times from 46 distinct sources. 197.248.24.129 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
Hirte
CAS-W: TCP-Scanner. Port: 23
Port Scan
security.rdmc.fr
Port Scan Attack proto:TCP src:32063 dst:23
Port Scan
MPL
tcp/23 (2 or more attempts)
Port Scan
Largnet SOC
197.248.24.129 triggered Icarus honeypot on port 23. Check us out on github.
Port Scan Hacking
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
guldkage
Unauthorized connection attempt detected from IP address 197.248.24.129 to port 23 (ger-03) [a]
Brute-Force Exploited Host
security.rdmc.fr
Port Scan Attack proto:TCP src:50501 dst:23
Port Scan
Hirte
C1-W: TCP-Scanner. Port: 23
Port Scan
BSG Webmaster
Port scanning (Port 23)
Port Scan Hacking
Hirte
SS1-W: TCP-Scanner. Port: 23
Port Scan
Hirte
SS5-W: TCP-Scanner. Port: 23
Port Scan
MPL
tcp/23
Port Scan
Alexandr Kulkov
197.248.24.129 triggered Icarus honeypot on port 23.
Port Scan Hacking
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
MPL
tcp/23
Port Scan

Showing 1 to 15 of 233 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com