AbuseIPDB » 200.123.248.206

Enter an IP Address, Domain Name, or Subnet:

e.g.   3.235.45.196, microsoft.com, or 5.188.10.0/24

200.123.248.206 was found in our database!

This IP was reported 130 times. Confidence of Abuse is 100%: ?

100%
ISP Intercity Comunicaciones S.A.
Usage Type Fixed Line ISP
Domain Name intercity.net.ar
Country Argentina
City Rio Cuarto, Cordoba

Spot an error? IP info including ISP, Usage Type, and Location provided by IP2Location.

IP Abuse Reports for 200.123.248.206:

This IP address has been reported a total of 130 times from 72 distinct sources. 200.123.248.206 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Anonymous
sshd: Failed password for invalid user .... from 200.123.248.206 port 3924 ssh2 (6 attempts)
Brute-Force SSH
HoneyPot-DE
Brute-Force SSH
andy
Invalid user biology from 200.123.248.206 port 36333
Brute-Force SSH
lvlup.pro
Failed password for invalid user patrick from 200.123.248.206 port 46771 ssh2
Brute-Force SSH
32bitbradley
Connection to SSH Honeypot - Detected by HoneypotDB
SSH
smibor
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
Brute-Force SSH
sverre26
Bruteforce detected by fail2ban
Brute-Force SSH
Max la Menace
Brute-Force SSH
Pornomens
Brute-Force SSH
kondziusob
"fail2ban match"
Brute-Force SSH
mishima0340.clear-net.jp
Automatic report BANNED IP
Brute-Force SSH
Pornomens
Brute-Force SSH
joãorodrigues.pt
Brute-Force SSH
RasyiidWho
DDoS Attack Port Scan Brute-Force Web App Attack SSH
DigiBean
Brute-Force SSH

Showing 1 to 15 of 130 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/200.123.248.206