AbuseIPDB » 200.76.29.2

Check an IP Address, Domain Name, or Subnet

e.g. 3.216.79.60, microsoft.com, or 5.188.10.0/24

200.76.29.2 was found in our database!

This IP was reported 15 times. Confidence of Abuse is 40%: ?

40%
ISP Alestra S. de R.L. de C.V.
Usage Type Fixed Line ISP
Hostname(s) static-200-76-29-2.alestra.net.mx
Domain Name alestra.com.mx
Country Mexico
City Cuajimalpa, Ciudad de Mexico

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 200.76.29.2:

This IP address has been reported a total of 15 times from 10 distinct sources. 200.76.29.2 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
Invisiblemen
Unauthorized connection attempt from IP address 200.76.29.2 on Port 139(NETBIOS)
Port Scan
Invisiblemen
Unauthorized connection attempt from IP address 200.76.29.2 on Port 445(SMB)
Port Scan
Hiffo
1606034233 - 11/22/2020 09:37:13 Host: 200.76.29.2/200.76.29.2 Port: 445 TCP Blocked
Port Scan
Anonymous
Port scan
Port Scan
IrisFlower
Unauthorized connection attempt detected from IP address 200.76.29.2 to port 139
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 200.76.29.2 to port 445
Hacking
IrisFlower
Unauthorized connection attempt detected from IP address 200.76.29.2 to port 445
Hacking
Largnet SOC
Icarus honeypot on github
Hacking
stfw
139/tcp 139/tcp 445/tcp
[2020-10-25]3pkt
Port Scan
Anonymous
[SYS2] Unsolicited Connect - Unused Port - Port=445 (1x)
Port Scan Exploited Host
IP Analyzer
Unauthorized connection attempt from IP address 200.76.29.2 on Port 139(NETBIOS)
Port Scan
openstrike.co.uk
Port Scan
etu brutus
20/9/[email protected]:48:04: FAIL: Alarm-Network address from=200.76.29.2
...
Hacking Brute-Force SSH
IrisFlower
Unauthorized connection attempt detected from IP address 200.76.29.2 to port 445 [T]
Port Scan
etu brutus
20/8/[email protected]:42:42: FAIL: Alarm-Network address from=200.76.29.2
...
Hacking Brute-Force SSH

Showing 1 to 15 of 15 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/200.76.29.2