AbuseIPDB » 2.57.121.23

Check an IP Address, Domain Name, or Subnet

e.g. 3.238.180.255, microsoft.com, or 5.188.10.0/24

2.57.121.23 was found in our database!

This IP was reported 349 times. Confidence of Abuse is 0%: ?

0%
ISP Unmanaged Ltd
Usage Type Data Center/Web Hosting/Transit
Hostname(s) hosting23.tronicsat.com
Domain Name unmanaged.uk
Country Romania
City Bucharest, Bucuresti

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 2.57.121.23:

This IP address has been reported a total of 349 times from 46 distinct sources. 2.57.121.23 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
buh04
2 per week from 2022-02-13T18:12:52+03:00, proto UDP, 2.57.121.23->RU_IP:5061
Port Scan
Joe-Mark
Found on CINS badguys / proto=17 . srcport=5308 . dstport=5061 . (3112)
Port Scan
JPPO
Port Scan
Joe-Mark
Portscan - at least three ports in under 300 ms. - Found on Block CINS-badguys (76)
Port Scan
KPS
PortscanM
Port Scan
invalidLuca
[UFW] Unauthorized connection attempt from 2.57.121.23
Port Scan
SE-botlist
Port scanning [24 denied]
Port Scan
StatsMe
2022-02-13T07:38:20.829897+0300
ET CINS Active Threat Intelligence Poor Reputation IP group 4
Port Scan Hacking Spoofing Brute-Force
I.Hate.Spam
Port scan detected on ports: 5062[UDP], 5061[UDP], 5063[UDP]
Port Scan
buh04
2 per week from 2022-02-06T20:33:59+03:00, proto UDP, 2.57.121.23->RU_IP:5060
Port Scan
OiledAmoeba
Brute-Force
balsakup.fr
[portscan] Port scan
Port Scan
ISPLtd
Port Scan
iNetWorker
firewall-block, port(s): 5061/udp
Port Scan
marcel-knorr.de
[MK-Root1] Blocked by UFW
Port Scan Brute-Force

Showing 1 to 15 of 349 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com