AbuseIPDB » 20.118.71.64

20.118.71.64 was found in our database!

This IP was reported 609 times. Confidence of Abuse is 100%: ?

100%
ISP Microsoft Corporation
Usage Type Data Center/Web Hosting/Transit
Hostname(s) azpdss30.stretchoid.com
Domain Name microsoft.com
Country United States of America
City San Antonio, Texas

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 20.118.71.64:

This IP address has been reported a total of 609 times from 131 distinct sources. 20.118.71.64 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
BSG Webmaster
Port scanning (Port 8099)
Port Scan Hacking
RoboAbuseCheck
Unsolicited connection attempts to port 1212
Port Scan
drewf.ink
[06:50] Tried to connect to SSH on port 2222 but didn't have a valid header (port scanner?)
Brute-Force SSH
☢MiG☢
TCP probe(s) @ 2222 US
Port Scan
Mr.Singh
NFT blocked 20.118.71.64 on 06-Jul-2024..
Port Scan Brute-Force
ATV
Unsolicited connection attempts to port 8443
Port Scan
oonux.net
RouterOS: Scanning detected TCP 20.118.71.64:56170 > x.x.x.x:2455
Port Scan
smopdidi
Ports: 2000; 2 attempts
Port Scan
marioselgreco
Automated report from mail server logs
Email Spam Hacking Spoofing
diego
[rede-176-124] 07/05/2024-09:34:26.613555, 20.118.71.64, Protocol: 17, GPL SNMP public access udp
Port Scan
iNetWorker
trying to access non-authorized port
Port Scan
deangelys
Honeypot activity: Unauthorized portscan activity of port(s):50000
Port Scan
diego
Events: TCP SYN Discovery or Flooding, Seen 12 times in the last 10800 seconds
DDoS Attack
KPS
PortscanM
Port Scan
diego
Hacking

Showing 76 to 90 of 609 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com