AbuseIPDB » 2.57.122.192

2.57.122.192 was found in our database!

This IP was reported 32,525 times. Confidence of Abuse is 0%: ?

0%
ISP TECHOFF SRV LIMITED
Usage Type Data Center/Web Hosting/Transit
ASN AS47890
Domain Name dmzhost.co
Country Romania
City Timisoara, Timiș County

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.

IP Abuse Reports for 2.57.122.192:

This IP address has been reported a total of 32,525 times from 1,581 distinct sources. 2.57.122.192 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
debaba
Feb 23 01:42:41 ichbinda sshd[3561920]: error: kex_exchange_identification:
...
Brute-Force SSH
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
urnilxfgbez
Last 24 Hours suspicious: (DPT=445|DPT=3389|DPT=22|DPT=3306|DPT=8080|DPT=23|DPT=5900|DPT=1433)
Port Scan
ThreatBook.io
ThreatBook Intelligence: Zombie,Scanner more details on https://threatbook.io/ip/2.57.122.192
SSH
Cynar & Cinny
ufw_block_log_banned
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/0, tcp/22
Brute-Force
Study Bitcoin 🤗
Port probe to tcp/22 (ssh)
[srv124]
Port Scan Brute-Force SSH
ps-center
SS4-W: TCP-Scanner. Port: 22
Port Scan
MPL
tcp/22 (7 or more attempts)
Port Scan
ps-center
SES-W: TCP-Scanner. Port: 22
Port Scan
Admins@FBN
FW-PortScan: Traffic Blocked srcport=47555 dstport=22
Port Scan Hacking SSH
Study Bitcoin 🤗
Port probe to tcp/22 (ssh)
[srv125]
Port Scan Brute-Force SSH
Study Bitcoin 🤗
Port probe to tcp/22 (ssh)
[srv125]
Port Scan Brute-Force SSH
Study Bitcoin 🤗
2 port probes: 2x tcp/22 (ssh)
[srv127]
Port Scan Brute-Force SSH
kot
scan port 22, 2.57.122.192 block
Port Scan

Showing 1 to 15 of 32525 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: